PeerChat.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428
  1. /**
  2. * @file PeerChat.c
  3. * @author Ambroz Bizjak <ambrop7@gmail.com>
  4. *
  5. * @section LICENSE
  6. *
  7. * Redistribution and use in source and binary forms, with or without
  8. * modification, are permitted provided that the following conditions are met:
  9. * 1. Redistributions of source code must retain the above copyright
  10. * notice, this list of conditions and the following disclaimer.
  11. * 2. Redistributions in binary form must reproduce the above copyright
  12. * notice, this list of conditions and the following disclaimer in the
  13. * documentation and/or other materials provided with the distribution.
  14. * 3. Neither the name of the author nor the
  15. * names of its contributors may be used to endorse or promote products
  16. * derived from this software without specific prior written permission.
  17. *
  18. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
  19. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
  20. * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
  21. * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
  22. * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
  23. * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  24. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
  25. * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
  26. * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
  27. * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  28. */
  29. #include <string.h>
  30. #include <ssl.h>
  31. #include <sslerr.h>
  32. #include <misc/byteorder.h>
  33. #include <security/BRandom.h>
  34. #include "PeerChat.h"
  35. #include <generated/blog_channel_PeerChat.h>
  36. #define PeerLog(_o, ...) BLog_LogViaFunc((_o)->logfunc, (_o)->user, BLOG_CURRENT_CHANNEL, __VA_ARGS__)
  37. static void report_error (PeerChat *o)
  38. {
  39. DebugError_AssertNoError(&o->d_err);
  40. DEBUGERROR(&o->d_err, o->handler_error(o->user))
  41. return;
  42. }
  43. static void recv_job_handler (PeerChat *o)
  44. {
  45. DebugObject_Access(&o->d_obj);
  46. DebugError_AssertNoError(&o->d_err);
  47. ASSERT(o->recv_data_len >= 0)
  48. ASSERT(o->recv_data_len <= SC_MAX_MSGLEN)
  49. int data_len = o->recv_data_len;
  50. // set no received data
  51. o->recv_data_len = -1;
  52. #ifdef PEERCHAT_SIMULATE_ERROR
  53. uint8_t x;
  54. BRandom_randomize(&x, sizeof(x));
  55. if (x < PEERCHAT_SIMULATE_ERROR) {
  56. PeerLog(o, BLOG_ERROR, "simulate error");
  57. report_error(o);
  58. return;
  59. }
  60. #endif
  61. if (o->ssl_mode != PEERCHAT_SSL_NONE) {
  62. // buffer data
  63. if (!SimpleStreamBuffer_Write(&o->ssl_recv_buf, o->recv_data, data_len)) {
  64. PeerLog(o, BLOG_ERROR, "out of recv buffer");
  65. report_error(o);
  66. return;
  67. }
  68. } else {
  69. // call message handler
  70. o->handler_message(o->user, o->recv_data, data_len);
  71. return;
  72. }
  73. }
  74. static void ssl_con_handler (PeerChat *o, int event)
  75. {
  76. DebugObject_Access(&o->d_obj);
  77. DebugError_AssertNoError(&o->d_err);
  78. ASSERT(o->ssl_mode == PEERCHAT_SSL_CLIENT || o->ssl_mode == PEERCHAT_SSL_SERVER)
  79. ASSERT(event == BSSLCONNECTION_EVENT_ERROR)
  80. PeerLog(o, BLOG_ERROR, "SSL error");
  81. report_error(o);
  82. return;
  83. }
  84. static SECStatus client_auth_data_callback (PeerChat *o, PRFileDesc *fd, CERTDistNames *caNames, CERTCertificate **pRetCert, SECKEYPrivateKey **pRetKey)
  85. {
  86. DebugObject_Access(&o->d_obj);
  87. ASSERT(o->ssl_mode == PEERCHAT_SSL_CLIENT)
  88. CERTCertificate *cert = CERT_DupCertificate(o->ssl_cert);
  89. if (!cert) {
  90. PeerLog(o, BLOG_ERROR, "CERT_DupCertificate failed");
  91. goto fail0;
  92. }
  93. SECKEYPrivateKey *key = SECKEY_CopyPrivateKey(o->ssl_key);
  94. if (!key) {
  95. PeerLog(o, BLOG_ERROR, "SECKEY_CopyPrivateKey failed");
  96. goto fail1;
  97. }
  98. *pRetCert = cert;
  99. *pRetKey = key;
  100. return SECSuccess;
  101. fail1:
  102. CERT_DestroyCertificate(cert);
  103. fail0:
  104. return SECFailure;
  105. }
  106. static SECStatus auth_certificate_callback (PeerChat *o, PRFileDesc *fd, PRBool checkSig, PRBool isServer)
  107. {
  108. DebugObject_Access(&o->d_obj);
  109. ASSERT(o->ssl_mode == PEERCHAT_SSL_CLIENT || o->ssl_mode == PEERCHAT_SSL_SERVER)
  110. // This callback is used to bypass checking the server's domain name, as peers
  111. // don't have domain names. We byte-compare the certificate to the one reported
  112. // by the server anyway.
  113. SECStatus ret = SECFailure;
  114. CERTCertificate *cert = SSL_PeerCertificate(o->ssl_prfd);
  115. if (!cert) {
  116. PeerLog(o, BLOG_ERROR, "SSL_PeerCertificate failed");
  117. PORT_SetError(SSL_ERROR_BAD_CERTIFICATE);
  118. goto fail1;
  119. }
  120. SECCertUsage cert_usage = (o->ssl_mode == PEERCHAT_SSL_CLIENT ? certUsageSSLServer : certUsageSSLClient);
  121. if (CERT_VerifyCertNow(CERT_GetDefaultCertDB(), cert, PR_TRUE, cert_usage, SSL_RevealPinArg(o->ssl_prfd)) != SECSuccess) {
  122. goto fail2;
  123. }
  124. // compare to certificate provided by the server
  125. SECItem der = cert->derCert;
  126. if (der.len != o->ssl_peer_cert_len || memcmp(der.data, o->ssl_peer_cert, der.len)) {
  127. PeerLog(o, BLOG_ERROR, "peer certificate doesn't match");
  128. PORT_SetError(SSL_ERROR_BAD_CERTIFICATE);
  129. goto fail2;
  130. }
  131. ret = SECSuccess;
  132. fail2:
  133. CERT_DestroyCertificate(cert);
  134. fail1:
  135. return ret;
  136. }
  137. static void ssl_recv_if_handler_send (PeerChat *o, uint8_t *data, int data_len)
  138. {
  139. DebugObject_Access(&o->d_obj);
  140. DebugError_AssertNoError(&o->d_err);
  141. ASSERT(o->ssl_mode == PEERCHAT_SSL_CLIENT || o->ssl_mode == PEERCHAT_SSL_SERVER)
  142. ASSERT(data_len >= 0)
  143. ASSERT(data_len <= SC_MAX_MSGLEN)
  144. // accept packet
  145. PacketPassInterface_Done(&o->ssl_recv_if);
  146. // call message handler
  147. o->handler_message(o->user, data, data_len);
  148. return;
  149. }
  150. static void ssl_recv_decoder_handler_error (PeerChat *o)
  151. {
  152. DebugObject_Access(&o->d_obj);
  153. DebugError_AssertNoError(&o->d_err);
  154. ASSERT(o->ssl_mode == PEERCHAT_SSL_CLIENT || o->ssl_mode == PEERCHAT_SSL_SERVER)
  155. PeerLog(o, BLOG_ERROR, "decoder error");
  156. report_error(o);
  157. return;
  158. }
  159. int PeerChat_Init (PeerChat *o, peerid_t peer_id, int ssl_mode, CERTCertificate *ssl_cert, SECKEYPrivateKey *ssl_key,
  160. uint8_t *ssl_peer_cert, int ssl_peer_cert_len, BPendingGroup *pg, void *user,
  161. BLog_logfunc logfunc,
  162. PeerChat_handler_error handler_error,
  163. PeerChat_handler_message handler_message)
  164. {
  165. ASSERT(ssl_mode == PEERCHAT_SSL_NONE || ssl_mode == PEERCHAT_SSL_CLIENT || ssl_mode == PEERCHAT_SSL_SERVER)
  166. ASSERT(ssl_mode == PEERCHAT_SSL_NONE || ssl_peer_cert_len >= 0)
  167. ASSERT(logfunc)
  168. ASSERT(handler_error)
  169. ASSERT(handler_message)
  170. // init arguments
  171. o->ssl_mode = ssl_mode;
  172. o->ssl_cert = ssl_cert;
  173. o->ssl_key = ssl_key;
  174. o->ssl_peer_cert = ssl_peer_cert;
  175. o->ssl_peer_cert_len = ssl_peer_cert_len;
  176. o->user = user;
  177. o->logfunc = logfunc;
  178. o->handler_error = handler_error;
  179. o->handler_message = handler_message;
  180. // init copier
  181. PacketCopier_Init(&o->copier, SC_MAX_MSGLEN, pg);
  182. // init SC encoder
  183. SCOutmsgEncoder_Init(&o->sc_encoder, peer_id, PacketCopier_GetOutput(&o->copier), pg);
  184. // init PacketProto encoder
  185. PacketProtoEncoder_Init(&o->pp_encoder, SCOutmsgEncoder_GetOutput(&o->sc_encoder), pg);
  186. // init recv job
  187. BPending_Init(&o->recv_job, pg, (BPending_handler)recv_job_handler, o);
  188. // set no received data
  189. o->recv_data_len = -1;
  190. PacketPassInterface *send_buf_output = PacketCopier_GetInput(&o->copier);
  191. if (o->ssl_mode != PEERCHAT_SSL_NONE) {
  192. // init receive buffer
  193. if (!SimpleStreamBuffer_Init(&o->ssl_recv_buf, PEERCHAT_SSL_RECV_BUF_SIZE, pg)) {
  194. PeerLog(o, BLOG_ERROR, "SimpleStreamBuffer_Init failed");
  195. goto fail1;
  196. }
  197. // init SSL StreamPacketSender
  198. StreamPacketSender_Init(&o->ssl_sp_sender, send_buf_output, pg);
  199. // init SSL bottom prfd
  200. if (!BSSLConnection_MakeBackend(&o->ssl_bottom_prfd, StreamPacketSender_GetInput(&o->ssl_sp_sender), SimpleStreamBuffer_GetOutput(&o->ssl_recv_buf))) {
  201. PeerLog(o, BLOG_ERROR, "BSSLConnection_MakeBackend failed");
  202. goto fail2;
  203. }
  204. // init SSL prfd
  205. if (!(o->ssl_prfd = SSL_ImportFD(NULL, &o->ssl_bottom_prfd))) {
  206. ASSERT_FORCE(PR_Close(&o->ssl_bottom_prfd) == PR_SUCCESS)
  207. PeerLog(o, BLOG_ERROR, "SSL_ImportFD failed");
  208. goto fail2;
  209. }
  210. // set client or server mode
  211. if (SSL_ResetHandshake(o->ssl_prfd, (o->ssl_mode == PEERCHAT_SSL_SERVER ? PR_TRUE : PR_FALSE)) != SECSuccess) {
  212. PeerLog(o, BLOG_ERROR, "SSL_ResetHandshake failed");
  213. goto fail3;
  214. }
  215. if (o->ssl_mode == PEERCHAT_SSL_SERVER) {
  216. // set server certificate
  217. if (SSL_ConfigSecureServer(o->ssl_prfd, o->ssl_cert, o->ssl_key, NSS_FindCertKEAType(o->ssl_cert)) != SECSuccess) {
  218. PeerLog(o, BLOG_ERROR, "SSL_ConfigSecureServer failed");
  219. goto fail3;
  220. }
  221. // set require client certificate
  222. if (SSL_OptionSet(o->ssl_prfd, SSL_REQUEST_CERTIFICATE, PR_TRUE) != SECSuccess) {
  223. PeerLog(o, BLOG_ERROR, "SSL_OptionSet(SSL_REQUEST_CERTIFICATE) failed");
  224. goto fail3;
  225. }
  226. if (SSL_OptionSet(o->ssl_prfd, SSL_REQUIRE_CERTIFICATE, PR_TRUE) != SECSuccess) {
  227. PeerLog(o, BLOG_ERROR, "SSL_OptionSet(SSL_REQUIRE_CERTIFICATE) failed");
  228. goto fail3;
  229. }
  230. } else {
  231. // set client certificate callback
  232. if (SSL_GetClientAuthDataHook(o->ssl_prfd, (SSLGetClientAuthData)client_auth_data_callback, o) != SECSuccess) {
  233. PeerLog(o, BLOG_ERROR, "SSL_GetClientAuthDataHook failed");
  234. goto fail3;
  235. }
  236. }
  237. // set verify peer certificate hook
  238. if (SSL_AuthCertificateHook(o->ssl_prfd, (SSLAuthCertificate)auth_certificate_callback, o) != SECSuccess) {
  239. PeerLog(o, BLOG_ERROR, "SSL_AuthCertificateHook failed");
  240. goto fail3;
  241. }
  242. // init SSL connection
  243. BSSLConnection_Init(&o->ssl_con, o->ssl_prfd, 0, pg, o, (BSSLConnection_handler)ssl_con_handler);
  244. // init SSL PacketStreamSender
  245. PacketStreamSender_Init(&o->ssl_ps_sender, BSSLConnection_GetSendIf(&o->ssl_con), sizeof(struct packetproto_header) + SC_MAX_MSGLEN, pg);
  246. // init SSL copier
  247. PacketCopier_Init(&o->ssl_copier, SC_MAX_MSGLEN, pg);
  248. // init SSL encoder
  249. PacketProtoEncoder_Init(&o->ssl_encoder, PacketCopier_GetOutput(&o->ssl_copier), pg);
  250. // init SSL buffer
  251. if (!SinglePacketBuffer_Init(&o->ssl_buffer, PacketProtoEncoder_GetOutput(&o->ssl_encoder), PacketStreamSender_GetInput(&o->ssl_ps_sender), pg)) {
  252. PeerLog(o, BLOG_ERROR, "SinglePacketBuffer_Init failed");
  253. goto fail4;
  254. }
  255. // init receive interface
  256. PacketPassInterface_Init(&o->ssl_recv_if, SC_MAX_MSGLEN, (PacketPassInterface_handler_send)ssl_recv_if_handler_send, o, pg);
  257. // init receive decoder
  258. if (!PacketProtoDecoder_Init(&o->ssl_recv_decoder, BSSLConnection_GetRecvIf(&o->ssl_con), &o->ssl_recv_if, pg, o, (PacketProtoDecoder_handler_error)ssl_recv_decoder_handler_error)) {
  259. PeerLog(o, BLOG_ERROR, "PacketProtoDecoder_Init failed");
  260. goto fail5;
  261. }
  262. send_buf_output = PacketCopier_GetInput(&o->ssl_copier);
  263. }
  264. // init send writer
  265. BufferWriter_Init(&o->send_writer, SC_MAX_MSGLEN, pg);
  266. // init send buffer
  267. if (!PacketBuffer_Init(&o->send_buf, BufferWriter_GetOutput(&o->send_writer), send_buf_output, PEERCHAT_SEND_BUF_SIZE, pg)) {
  268. PeerLog(o, BLOG_ERROR, "PacketBuffer_Init failed");
  269. goto fail6;
  270. }
  271. DebugError_Init(&o->d_err, pg);
  272. DebugObject_Init(&o->d_obj);
  273. return 1;
  274. fail6:
  275. BufferWriter_Free(&o->send_writer);
  276. if (o->ssl_mode != PEERCHAT_SSL_NONE) {
  277. PacketProtoDecoder_Free(&o->ssl_recv_decoder);
  278. fail5:
  279. PacketPassInterface_Free(&o->ssl_recv_if);
  280. SinglePacketBuffer_Free(&o->ssl_buffer);
  281. fail4:
  282. PacketProtoEncoder_Free(&o->ssl_encoder);
  283. PacketCopier_Free(&o->ssl_copier);
  284. PacketStreamSender_Free(&o->ssl_ps_sender);
  285. BSSLConnection_Free(&o->ssl_con);
  286. fail3:
  287. ASSERT_FORCE(PR_Close(o->ssl_prfd) == PR_SUCCESS)
  288. fail2:
  289. StreamPacketSender_Free(&o->ssl_sp_sender);
  290. SimpleStreamBuffer_Free(&o->ssl_recv_buf);
  291. }
  292. fail1:
  293. BPending_Free(&o->recv_job);
  294. PacketProtoEncoder_Free(&o->pp_encoder);
  295. SCOutmsgEncoder_Free(&o->sc_encoder);
  296. PacketCopier_Free(&o->copier);
  297. return 0;
  298. }
  299. void PeerChat_Free (PeerChat *o)
  300. {
  301. DebugObject_Free(&o->d_obj);
  302. DebugError_Free(&o->d_err);
  303. PacketBuffer_Free(&o->send_buf);
  304. BufferWriter_Free(&o->send_writer);
  305. if (o->ssl_mode != PEERCHAT_SSL_NONE) {
  306. PacketProtoDecoder_Free(&o->ssl_recv_decoder);
  307. PacketPassInterface_Free(&o->ssl_recv_if);
  308. SinglePacketBuffer_Free(&o->ssl_buffer);
  309. PacketProtoEncoder_Free(&o->ssl_encoder);
  310. PacketCopier_Free(&o->ssl_copier);
  311. PacketStreamSender_Free(&o->ssl_ps_sender);
  312. BSSLConnection_Free(&o->ssl_con);
  313. ASSERT_FORCE(PR_Close(o->ssl_prfd) == PR_SUCCESS)
  314. StreamPacketSender_Free(&o->ssl_sp_sender);
  315. SimpleStreamBuffer_Free(&o->ssl_recv_buf);
  316. }
  317. BPending_Free(&o->recv_job);
  318. PacketProtoEncoder_Free(&o->pp_encoder);
  319. SCOutmsgEncoder_Free(&o->sc_encoder);
  320. PacketCopier_Free(&o->copier);
  321. }
  322. PacketRecvInterface * PeerChat_GetSendOutput (PeerChat *o)
  323. {
  324. DebugObject_Access(&o->d_obj);
  325. return PacketProtoEncoder_GetOutput(&o->pp_encoder);
  326. }
  327. void PeerChat_InputReceived (PeerChat *o, uint8_t *data, int data_len)
  328. {
  329. DebugObject_Access(&o->d_obj);
  330. DebugError_AssertNoError(&o->d_err);
  331. ASSERT(o->recv_data_len == -1)
  332. ASSERT(data_len >= 0)
  333. ASSERT(data_len <= SC_MAX_MSGLEN)
  334. // remember data
  335. o->recv_data = data;
  336. o->recv_data_len = data_len;
  337. // set received job
  338. BPending_Set(&o->recv_job);
  339. }
  340. int PeerChat_StartMessage (PeerChat *o, uint8_t **data)
  341. {
  342. DebugObject_Access(&o->d_obj);
  343. DebugError_AssertNoError(&o->d_err);
  344. return BufferWriter_StartPacket(&o->send_writer, data);
  345. }
  346. void PeerChat_EndMessage (PeerChat *o, int data_len)
  347. {
  348. DebugObject_Access(&o->d_obj);
  349. DebugError_AssertNoError(&o->d_err);
  350. ASSERT(data_len >= 0)
  351. ASSERT(data_len <= SC_MAX_MSGLEN)
  352. BufferWriter_EndPacket(&o->send_writer, data_len);
  353. }