|
@@ -53,15 +53,15 @@
|
|
|
|
|
|
namespace {
|
|
|
#if !defined(__MAC_10_8)
|
|
|
- static const SSLProtocol kTLSProtocol11 = (SSLProtocol)(kSSLProtocolAll + 1);
|
|
|
- static const SSLProtocol kTLSProtocol12 = (SSLProtocol)(kSSLProtocolAll + 2);
|
|
|
+static const SSLProtocol kTLSProtocol11 = (SSLProtocol)(kSSLProtocolAll + 1);
|
|
|
+static const SSLProtocol kTLSProtocol12 = (SSLProtocol)(kSSLProtocolAll + 2);
|
|
|
#endif
|
|
|
|
|
|
#ifndef CIPHER_NO_DHPARAM
|
|
|
- // Diffie-Hellman params, to seed the engine instead of having it spend up
|
|
|
- // to 30 seconds on generating them. It should be save to share these. :p
|
|
|
- // This was generated using: openssl dhparam -outform DER 2048
|
|
|
- static const uint8_t dhparam[] =
|
|
|
+// Diffie-Hellman params, to seed the engine instead of having it spend up
|
|
|
+// to 30 seconds on generating them. It should be save to share these. :p
|
|
|
+// This was generated using: openssl dhparam -outform DER 2048
|
|
|
+static const uint8_t dhparam[] =
|
|
|
"\x30\x82\x01\x08\x02\x82\x01\x01\x00\x97\xea\xd0\x46\xf7\xae\xa7\x76\x80"
|
|
|
"\x9c\x74\x56\x98\xd8\x56\x97\x2b\x20\x6c\x77\xe2\x82\xbb\xc8\x84\xbe\xe7"
|
|
|
"\x63\xaf\xcc\x30\xd0\x67\x97\x7d\x1b\xab\x59\x30\xa9\x13\x67\x21\xd7\xd4"
|
|
@@ -79,270 +79,261 @@ namespace {
|
|
|
"\x90\x0b\x35\x64\xff\xd9\xe3\xac\xf2\xf2\xeb\x3a\x63\x02\x01\x02";
|
|
|
#endif // CIPHER_NO_DHPARAM
|
|
|
|
|
|
- static inline const char *protoToString(SSLProtocol proto) {
|
|
|
- switch (proto) {
|
|
|
- case kSSLProtocol2:
|
|
|
- return "SSLv2 (!)";
|
|
|
- case kSSLProtocol3:
|
|
|
- return "SSLv3";
|
|
|
- case kTLSProtocol1:
|
|
|
- return "TLSv1";
|
|
|
- case kTLSProtocol11:
|
|
|
- return "TLSv1.1";
|
|
|
- case kTLSProtocol12:
|
|
|
- return "TLSv1.2";
|
|
|
- default:
|
|
|
- return "Unknown";
|
|
|
- }
|
|
|
+static inline const char* protoToString(SSLProtocol proto)
|
|
|
+{
|
|
|
+ switch (proto) {
|
|
|
+ case kSSLProtocol2:
|
|
|
+ return "SSLv2 (!)";
|
|
|
+ case kSSLProtocol3:
|
|
|
+ return "SSLv3";
|
|
|
+ case kTLSProtocol1:
|
|
|
+ return "TLSv1";
|
|
|
+ case kTLSProtocol11:
|
|
|
+ return "TLSv1.1";
|
|
|
+ case kTLSProtocol12:
|
|
|
+ return "TLSv1.2";
|
|
|
+ default:
|
|
|
+ return "Unknown";
|
|
|
}
|
|
|
+}
|
|
|
|
|
|
-#define SUITE(s, n) { n, #s }
|
|
|
- static struct {
|
|
|
- SSLCipherSuite suite;
|
|
|
- const char *name;
|
|
|
- } kSuites[] = {
|
|
|
- // From CipherSuite.h (10.9)
|
|
|
- SUITE(SSL_NULL_WITH_NULL_NULL, 0x0000),
|
|
|
- SUITE(SSL_RSA_WITH_NULL_MD5, 0x0001),
|
|
|
- SUITE(SSL_RSA_WITH_NULL_SHA, 0x0002),
|
|
|
- SUITE(SSL_RSA_EXPORT_WITH_RC4_40_MD5, 0x0003),
|
|
|
- SUITE(SSL_RSA_WITH_RC4_128_MD5, 0x0004),
|
|
|
- SUITE(SSL_RSA_WITH_RC4_128_SHA, 0x0005),
|
|
|
- SUITE(SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5, 0x0006),
|
|
|
- SUITE(SSL_RSA_WITH_IDEA_CBC_SHA, 0x0007),
|
|
|
- SUITE(SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, 0x0008),
|
|
|
- SUITE(SSL_RSA_WITH_DES_CBC_SHA, 0x0009),
|
|
|
- SUITE(SSL_RSA_WITH_3DES_EDE_CBC_SHA, 0x000A),
|
|
|
- SUITE(SSL_DH_DSS_EXPORT_WITH_DES40_CBC_SHA, 0x000B),
|
|
|
- SUITE(SSL_DH_DSS_WITH_DES_CBC_SHA, 0x000C),
|
|
|
- SUITE(SSL_DH_DSS_WITH_3DES_EDE_CBC_SHA, 0x000D),
|
|
|
- SUITE(SSL_DH_RSA_EXPORT_WITH_DES40_CBC_SHA, 0x000E),
|
|
|
- SUITE(SSL_DH_RSA_WITH_DES_CBC_SHA, 0x000F),
|
|
|
- SUITE(SSL_DH_RSA_WITH_3DES_EDE_CBC_SHA, 0x0010),
|
|
|
- SUITE(SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, 0x0011),
|
|
|
- SUITE(SSL_DHE_DSS_WITH_DES_CBC_SHA, 0x0012),
|
|
|
- SUITE(SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, 0x0013),
|
|
|
- SUITE(SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, 0x0014),
|
|
|
- SUITE(SSL_DHE_RSA_WITH_DES_CBC_SHA, 0x0015),
|
|
|
- SUITE(SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, 0x0016),
|
|
|
- SUITE(SSL_DH_anon_EXPORT_WITH_RC4_40_MD5, 0x0017),
|
|
|
- SUITE(SSL_DH_anon_WITH_RC4_128_MD5, 0x0018),
|
|
|
- SUITE(SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA, 0x0019),
|
|
|
- SUITE(SSL_DH_anon_WITH_DES_CBC_SHA, 0x001A),
|
|
|
- SUITE(SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, 0x001B),
|
|
|
- SUITE(SSL_FORTEZZA_DMS_WITH_NULL_SHA, 0x001C),
|
|
|
- SUITE(SSL_FORTEZZA_DMS_WITH_FORTEZZA_CBC_SHA, 0x001D),
|
|
|
-
|
|
|
- SUITE(TLS_RSA_WITH_AES_128_CBC_SHA, 0x002F),
|
|
|
- SUITE(TLS_DH_DSS_WITH_AES_128_CBC_SHA, 0x0030),
|
|
|
- SUITE(TLS_DH_RSA_WITH_AES_128_CBC_SHA, 0x0031),
|
|
|
- SUITE(TLS_DHE_DSS_WITH_AES_128_CBC_SHA, 0x0032),
|
|
|
- SUITE(TLS_DHE_RSA_WITH_AES_128_CBC_SHA, 0x0033),
|
|
|
- SUITE(TLS_DH_anon_WITH_AES_128_CBC_SHA, 0x0034),
|
|
|
- SUITE(TLS_RSA_WITH_AES_256_CBC_SHA, 0x0035),
|
|
|
- SUITE(TLS_DH_DSS_WITH_AES_256_CBC_SHA, 0x0036),
|
|
|
- SUITE(TLS_DH_RSA_WITH_AES_256_CBC_SHA, 0x0037),
|
|
|
- SUITE(TLS_DHE_DSS_WITH_AES_256_CBC_SHA, 0x0038),
|
|
|
- SUITE(TLS_DHE_RSA_WITH_AES_256_CBC_SHA, 0x0039),
|
|
|
- SUITE(TLS_DH_anon_WITH_AES_256_CBC_SHA, 0x003A),
|
|
|
-
|
|
|
- SUITE(TLS_ECDH_ECDSA_WITH_NULL_SHA, 0xC001),
|
|
|
- SUITE(TLS_ECDH_ECDSA_WITH_RC4_128_SHA, 0xC002),
|
|
|
- SUITE(TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, 0xC003),
|
|
|
- SUITE(TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, 0xC004),
|
|
|
- SUITE(TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, 0xC005),
|
|
|
- SUITE(TLS_ECDHE_ECDSA_WITH_NULL_SHA, 0xC006),
|
|
|
- SUITE(TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, 0xC007),
|
|
|
- SUITE(TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, 0xC008),
|
|
|
- SUITE(TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, 0xC009),
|
|
|
- SUITE(TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, 0xC00A),
|
|
|
- SUITE(TLS_ECDH_RSA_WITH_NULL_SHA, 0xC00B),
|
|
|
- SUITE(TLS_ECDH_RSA_WITH_RC4_128_SHA, 0xC00C),
|
|
|
- SUITE(TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, 0xC00D),
|
|
|
- SUITE(TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, 0xC00E),
|
|
|
- SUITE(TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, 0xC00F),
|
|
|
- SUITE(TLS_ECDHE_RSA_WITH_NULL_SHA, 0xC010),
|
|
|
- SUITE(TLS_ECDHE_RSA_WITH_RC4_128_SHA, 0xC011),
|
|
|
- SUITE(TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, 0xC012),
|
|
|
- SUITE(TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, 0xC013),
|
|
|
- SUITE(TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, 0xC014),
|
|
|
- SUITE(TLS_ECDH_anon_WITH_NULL_SHA, 0xC015),
|
|
|
- SUITE(TLS_ECDH_anon_WITH_RC4_128_SHA, 0xC016),
|
|
|
- SUITE(TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA, 0xC017),
|
|
|
- SUITE(TLS_ECDH_anon_WITH_AES_128_CBC_SHA, 0xC018),
|
|
|
- SUITE(TLS_ECDH_anon_WITH_AES_256_CBC_SHA, 0xC019),
|
|
|
-
|
|
|
- SUITE(TLS_NULL_WITH_NULL_NULL, 0x0000),
|
|
|
-
|
|
|
- SUITE(TLS_RSA_WITH_NULL_MD5, 0x0001),
|
|
|
- SUITE(TLS_RSA_WITH_NULL_SHA, 0x0002),
|
|
|
- SUITE(TLS_RSA_WITH_RC4_128_MD5, 0x0004),
|
|
|
- SUITE(TLS_RSA_WITH_RC4_128_SHA, 0x0005),
|
|
|
- SUITE(TLS_RSA_WITH_3DES_EDE_CBC_SHA, 0x000A),
|
|
|
- SUITE(TLS_RSA_WITH_NULL_SHA256, 0x003B),
|
|
|
- SUITE(TLS_RSA_WITH_AES_128_CBC_SHA256, 0x003C),
|
|
|
- SUITE(TLS_RSA_WITH_AES_256_CBC_SHA256, 0x003D),
|
|
|
-
|
|
|
- SUITE(TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA, 0x000D),
|
|
|
- SUITE(TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA, 0x0010),
|
|
|
- SUITE(TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA, 0x0013),
|
|
|
- SUITE(TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA, 0x0016),
|
|
|
- SUITE(TLS_DH_DSS_WITH_AES_128_CBC_SHA256, 0x003E),
|
|
|
- SUITE(TLS_DH_RSA_WITH_AES_128_CBC_SHA256, 0x003F),
|
|
|
- SUITE(TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, 0x0040),
|
|
|
- SUITE(TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, 0x0067),
|
|
|
- SUITE(TLS_DH_DSS_WITH_AES_256_CBC_SHA256, 0x0068),
|
|
|
- SUITE(TLS_DH_RSA_WITH_AES_256_CBC_SHA256, 0x0069),
|
|
|
- SUITE(TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, 0x006A),
|
|
|
- SUITE(TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, 0x006B),
|
|
|
-
|
|
|
- SUITE(TLS_DH_anon_WITH_RC4_128_MD5, 0x0018),
|
|
|
- SUITE(TLS_DH_anon_WITH_3DES_EDE_CBC_SHA, 0x001B),
|
|
|
- SUITE(TLS_DH_anon_WITH_AES_128_CBC_SHA256, 0x006C),
|
|
|
- SUITE(TLS_DH_anon_WITH_AES_256_CBC_SHA256, 0x006D),
|
|
|
-
|
|
|
- SUITE(TLS_PSK_WITH_RC4_128_SHA, 0x008A),
|
|
|
- SUITE(TLS_PSK_WITH_3DES_EDE_CBC_SHA, 0x008B),
|
|
|
- SUITE(TLS_PSK_WITH_AES_128_CBC_SHA, 0x008C),
|
|
|
- SUITE(TLS_PSK_WITH_AES_256_CBC_SHA, 0x008D),
|
|
|
- SUITE(TLS_DHE_PSK_WITH_RC4_128_SHA, 0x008E),
|
|
|
- SUITE(TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA, 0x008F),
|
|
|
- SUITE(TLS_DHE_PSK_WITH_AES_128_CBC_SHA, 0x0090),
|
|
|
- SUITE(TLS_DHE_PSK_WITH_AES_256_CBC_SHA, 0x0091),
|
|
|
- SUITE(TLS_RSA_PSK_WITH_RC4_128_SHA, 0x0092),
|
|
|
- SUITE(TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA, 0x0093),
|
|
|
- SUITE(TLS_RSA_PSK_WITH_AES_128_CBC_SHA, 0x0094),
|
|
|
- SUITE(TLS_RSA_PSK_WITH_AES_256_CBC_SHA, 0x0095),
|
|
|
-
|
|
|
- SUITE(TLS_PSK_WITH_NULL_SHA, 0x002C),
|
|
|
- SUITE(TLS_DHE_PSK_WITH_NULL_SHA, 0x002D),
|
|
|
- SUITE(TLS_RSA_PSK_WITH_NULL_SHA, 0x002E),
|
|
|
-
|
|
|
- SUITE(TLS_RSA_WITH_AES_128_GCM_SHA256, 0x009C),
|
|
|
- SUITE(TLS_RSA_WITH_AES_256_GCM_SHA384, 0x009D),
|
|
|
- SUITE(TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, 0x009E),
|
|
|
- SUITE(TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, 0x009F),
|
|
|
- SUITE(TLS_DH_RSA_WITH_AES_128_GCM_SHA256, 0x00A0),
|
|
|
- SUITE(TLS_DH_RSA_WITH_AES_256_GCM_SHA384, 0x00A1),
|
|
|
- SUITE(TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, 0x00A2),
|
|
|
- SUITE(TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, 0x00A3),
|
|
|
- SUITE(TLS_DH_DSS_WITH_AES_128_GCM_SHA256, 0x00A4),
|
|
|
- SUITE(TLS_DH_DSS_WITH_AES_256_GCM_SHA384, 0x00A5),
|
|
|
- SUITE(TLS_DH_anon_WITH_AES_128_GCM_SHA256, 0x00A6),
|
|
|
- SUITE(TLS_DH_anon_WITH_AES_256_GCM_SHA384, 0x00A7),
|
|
|
-
|
|
|
- SUITE(TLS_PSK_WITH_AES_128_GCM_SHA256, 0x00A8),
|
|
|
- SUITE(TLS_PSK_WITH_AES_256_GCM_SHA384, 0x00A9),
|
|
|
- SUITE(TLS_DHE_PSK_WITH_AES_128_GCM_SHA256, 0x00AA),
|
|
|
- SUITE(TLS_DHE_PSK_WITH_AES_256_GCM_SHA384, 0x00AB),
|
|
|
- SUITE(TLS_RSA_PSK_WITH_AES_128_GCM_SHA256, 0x00AC),
|
|
|
- SUITE(TLS_RSA_PSK_WITH_AES_256_GCM_SHA384, 0x00AD),
|
|
|
-
|
|
|
- SUITE(TLS_PSK_WITH_AES_128_CBC_SHA256, 0x00AE),
|
|
|
- SUITE(TLS_PSK_WITH_AES_256_CBC_SHA384, 0x00AF),
|
|
|
- SUITE(TLS_PSK_WITH_NULL_SHA256, 0x00B0),
|
|
|
- SUITE(TLS_PSK_WITH_NULL_SHA384, 0x00B1),
|
|
|
-
|
|
|
- SUITE(TLS_DHE_PSK_WITH_AES_128_CBC_SHA256, 0x00B2),
|
|
|
- SUITE(TLS_DHE_PSK_WITH_AES_256_CBC_SHA384, 0x00B3),
|
|
|
- SUITE(TLS_DHE_PSK_WITH_NULL_SHA256, 0x00B4),
|
|
|
- SUITE(TLS_DHE_PSK_WITH_NULL_SHA384, 0x00B5),
|
|
|
-
|
|
|
- SUITE(TLS_RSA_PSK_WITH_AES_128_CBC_SHA256, 0x00B6),
|
|
|
- SUITE(TLS_RSA_PSK_WITH_AES_256_CBC_SHA384, 0x00B7),
|
|
|
- SUITE(TLS_RSA_PSK_WITH_NULL_SHA256, 0x00B8),
|
|
|
- SUITE(TLS_RSA_PSK_WITH_NULL_SHA384, 0x00B9),
|
|
|
-
|
|
|
- SUITE(TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, 0xC023),
|
|
|
- SUITE(TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, 0xC024),
|
|
|
- SUITE(TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, 0xC025),
|
|
|
- SUITE(TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, 0xC026),
|
|
|
- SUITE(TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, 0xC027),
|
|
|
- SUITE(TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, 0xC028),
|
|
|
- SUITE(TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, 0xC029),
|
|
|
- SUITE(TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, 0xC02A),
|
|
|
-
|
|
|
- SUITE(TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, 0xC02B),
|
|
|
- SUITE(TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, 0xC02C),
|
|
|
- SUITE(TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, 0xC02D),
|
|
|
- SUITE(TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, 0xC02E),
|
|
|
- SUITE(TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, 0xC02F),
|
|
|
- SUITE(TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, 0xC030),
|
|
|
- SUITE(TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, 0xC031),
|
|
|
- SUITE(TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, 0xC032),
|
|
|
-
|
|
|
- SUITE(TLS_EMPTY_RENEGOTIATION_INFO_SCSV, 0x00FF),
|
|
|
- SUITE(SSL_RSA_WITH_RC2_CBC_MD5, 0xFF80),
|
|
|
- SUITE(SSL_RSA_WITH_IDEA_CBC_MD5, 0xFF81),
|
|
|
- SUITE(SSL_RSA_WITH_DES_CBC_MD5, 0xFF82),
|
|
|
- SUITE(SSL_RSA_WITH_3DES_EDE_CBC_MD5, 0xFF83),
|
|
|
- SUITE(SSL_NO_SUCH_CIPHERSUITE, 0xFFFF)
|
|
|
- };
|
|
|
+#define SUITE(s, n) \
|
|
|
+ { \
|
|
|
+ n, #s \
|
|
|
+ }
|
|
|
+static struct
|
|
|
+{
|
|
|
+ SSLCipherSuite suite;
|
|
|
+ const char* name;
|
|
|
+} kSuites[] = {
|
|
|
+ // From CipherSuite.h (10.9)
|
|
|
+ SUITE(SSL_NULL_WITH_NULL_NULL, 0x0000),
|
|
|
+ SUITE(SSL_RSA_WITH_NULL_MD5, 0x0001),
|
|
|
+ SUITE(SSL_RSA_WITH_NULL_SHA, 0x0002),
|
|
|
+ SUITE(SSL_RSA_EXPORT_WITH_RC4_40_MD5, 0x0003),
|
|
|
+ SUITE(SSL_RSA_WITH_RC4_128_MD5, 0x0004),
|
|
|
+ SUITE(SSL_RSA_WITH_RC4_128_SHA, 0x0005),
|
|
|
+ SUITE(SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5, 0x0006),
|
|
|
+ SUITE(SSL_RSA_WITH_IDEA_CBC_SHA, 0x0007),
|
|
|
+ SUITE(SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, 0x0008),
|
|
|
+ SUITE(SSL_RSA_WITH_DES_CBC_SHA, 0x0009),
|
|
|
+ SUITE(SSL_RSA_WITH_3DES_EDE_CBC_SHA, 0x000A),
|
|
|
+ SUITE(SSL_DH_DSS_EXPORT_WITH_DES40_CBC_SHA, 0x000B),
|
|
|
+ SUITE(SSL_DH_DSS_WITH_DES_CBC_SHA, 0x000C),
|
|
|
+ SUITE(SSL_DH_DSS_WITH_3DES_EDE_CBC_SHA, 0x000D),
|
|
|
+ SUITE(SSL_DH_RSA_EXPORT_WITH_DES40_CBC_SHA, 0x000E),
|
|
|
+ SUITE(SSL_DH_RSA_WITH_DES_CBC_SHA, 0x000F),
|
|
|
+ SUITE(SSL_DH_RSA_WITH_3DES_EDE_CBC_SHA, 0x0010),
|
|
|
+ SUITE(SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, 0x0011),
|
|
|
+ SUITE(SSL_DHE_DSS_WITH_DES_CBC_SHA, 0x0012),
|
|
|
+ SUITE(SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, 0x0013),
|
|
|
+ SUITE(SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, 0x0014),
|
|
|
+ SUITE(SSL_DHE_RSA_WITH_DES_CBC_SHA, 0x0015),
|
|
|
+ SUITE(SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, 0x0016),
|
|
|
+ SUITE(SSL_DH_anon_EXPORT_WITH_RC4_40_MD5, 0x0017),
|
|
|
+ SUITE(SSL_DH_anon_WITH_RC4_128_MD5, 0x0018),
|
|
|
+ SUITE(SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA, 0x0019),
|
|
|
+ SUITE(SSL_DH_anon_WITH_DES_CBC_SHA, 0x001A),
|
|
|
+ SUITE(SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, 0x001B),
|
|
|
+ SUITE(SSL_FORTEZZA_DMS_WITH_NULL_SHA, 0x001C),
|
|
|
+ SUITE(SSL_FORTEZZA_DMS_WITH_FORTEZZA_CBC_SHA, 0x001D),
|
|
|
+ SUITE(TLS_RSA_WITH_AES_128_CBC_SHA, 0x002F),
|
|
|
+ SUITE(TLS_DH_DSS_WITH_AES_128_CBC_SHA, 0x0030),
|
|
|
+ SUITE(TLS_DH_RSA_WITH_AES_128_CBC_SHA, 0x0031),
|
|
|
+ SUITE(TLS_DHE_DSS_WITH_AES_128_CBC_SHA, 0x0032),
|
|
|
+ SUITE(TLS_DHE_RSA_WITH_AES_128_CBC_SHA, 0x0033),
|
|
|
+ SUITE(TLS_DH_anon_WITH_AES_128_CBC_SHA, 0x0034),
|
|
|
+ SUITE(TLS_RSA_WITH_AES_256_CBC_SHA, 0x0035),
|
|
|
+ SUITE(TLS_DH_DSS_WITH_AES_256_CBC_SHA, 0x0036),
|
|
|
+ SUITE(TLS_DH_RSA_WITH_AES_256_CBC_SHA, 0x0037),
|
|
|
+ SUITE(TLS_DHE_DSS_WITH_AES_256_CBC_SHA, 0x0038),
|
|
|
+ SUITE(TLS_DHE_RSA_WITH_AES_256_CBC_SHA, 0x0039),
|
|
|
+ SUITE(TLS_DH_anon_WITH_AES_256_CBC_SHA, 0x003A),
|
|
|
+ SUITE(TLS_ECDH_ECDSA_WITH_NULL_SHA, 0xC001),
|
|
|
+ SUITE(TLS_ECDH_ECDSA_WITH_RC4_128_SHA, 0xC002),
|
|
|
+ SUITE(TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, 0xC003),
|
|
|
+ SUITE(TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, 0xC004),
|
|
|
+ SUITE(TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, 0xC005),
|
|
|
+ SUITE(TLS_ECDHE_ECDSA_WITH_NULL_SHA, 0xC006),
|
|
|
+ SUITE(TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, 0xC007),
|
|
|
+ SUITE(TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, 0xC008),
|
|
|
+ SUITE(TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, 0xC009),
|
|
|
+ SUITE(TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, 0xC00A),
|
|
|
+ SUITE(TLS_ECDH_RSA_WITH_NULL_SHA, 0xC00B),
|
|
|
+ SUITE(TLS_ECDH_RSA_WITH_RC4_128_SHA, 0xC00C),
|
|
|
+ SUITE(TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, 0xC00D),
|
|
|
+ SUITE(TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, 0xC00E),
|
|
|
+ SUITE(TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, 0xC00F),
|
|
|
+ SUITE(TLS_ECDHE_RSA_WITH_NULL_SHA, 0xC010),
|
|
|
+ SUITE(TLS_ECDHE_RSA_WITH_RC4_128_SHA, 0xC011),
|
|
|
+ SUITE(TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, 0xC012),
|
|
|
+ SUITE(TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, 0xC013),
|
|
|
+ SUITE(TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, 0xC014),
|
|
|
+ SUITE(TLS_ECDH_anon_WITH_NULL_SHA, 0xC015),
|
|
|
+ SUITE(TLS_ECDH_anon_WITH_RC4_128_SHA, 0xC016),
|
|
|
+ SUITE(TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA, 0xC017),
|
|
|
+ SUITE(TLS_ECDH_anon_WITH_AES_128_CBC_SHA, 0xC018),
|
|
|
+ SUITE(TLS_ECDH_anon_WITH_AES_256_CBC_SHA, 0xC019),
|
|
|
+ SUITE(TLS_NULL_WITH_NULL_NULL, 0x0000),
|
|
|
+ SUITE(TLS_RSA_WITH_NULL_MD5, 0x0001),
|
|
|
+ SUITE(TLS_RSA_WITH_NULL_SHA, 0x0002),
|
|
|
+ SUITE(TLS_RSA_WITH_RC4_128_MD5, 0x0004),
|
|
|
+ SUITE(TLS_RSA_WITH_RC4_128_SHA, 0x0005),
|
|
|
+ SUITE(TLS_RSA_WITH_3DES_EDE_CBC_SHA, 0x000A),
|
|
|
+ SUITE(TLS_RSA_WITH_NULL_SHA256, 0x003B),
|
|
|
+ SUITE(TLS_RSA_WITH_AES_128_CBC_SHA256, 0x003C),
|
|
|
+ SUITE(TLS_RSA_WITH_AES_256_CBC_SHA256, 0x003D),
|
|
|
+ SUITE(TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA, 0x000D),
|
|
|
+ SUITE(TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA, 0x0010),
|
|
|
+ SUITE(TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA, 0x0013),
|
|
|
+ SUITE(TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA, 0x0016),
|
|
|
+ SUITE(TLS_DH_DSS_WITH_AES_128_CBC_SHA256, 0x003E),
|
|
|
+ SUITE(TLS_DH_RSA_WITH_AES_128_CBC_SHA256, 0x003F),
|
|
|
+ SUITE(TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, 0x0040),
|
|
|
+ SUITE(TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, 0x0067),
|
|
|
+ SUITE(TLS_DH_DSS_WITH_AES_256_CBC_SHA256, 0x0068),
|
|
|
+ SUITE(TLS_DH_RSA_WITH_AES_256_CBC_SHA256, 0x0069),
|
|
|
+ SUITE(TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, 0x006A),
|
|
|
+ SUITE(TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, 0x006B),
|
|
|
+ SUITE(TLS_DH_anon_WITH_RC4_128_MD5, 0x0018),
|
|
|
+ SUITE(TLS_DH_anon_WITH_3DES_EDE_CBC_SHA, 0x001B),
|
|
|
+ SUITE(TLS_DH_anon_WITH_AES_128_CBC_SHA256, 0x006C),
|
|
|
+ SUITE(TLS_DH_anon_WITH_AES_256_CBC_SHA256, 0x006D),
|
|
|
+ SUITE(TLS_PSK_WITH_RC4_128_SHA, 0x008A),
|
|
|
+ SUITE(TLS_PSK_WITH_3DES_EDE_CBC_SHA, 0x008B),
|
|
|
+ SUITE(TLS_PSK_WITH_AES_128_CBC_SHA, 0x008C),
|
|
|
+ SUITE(TLS_PSK_WITH_AES_256_CBC_SHA, 0x008D),
|
|
|
+ SUITE(TLS_DHE_PSK_WITH_RC4_128_SHA, 0x008E),
|
|
|
+ SUITE(TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA, 0x008F),
|
|
|
+ SUITE(TLS_DHE_PSK_WITH_AES_128_CBC_SHA, 0x0090),
|
|
|
+ SUITE(TLS_DHE_PSK_WITH_AES_256_CBC_SHA, 0x0091),
|
|
|
+ SUITE(TLS_RSA_PSK_WITH_RC4_128_SHA, 0x0092),
|
|
|
+ SUITE(TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA, 0x0093),
|
|
|
+ SUITE(TLS_RSA_PSK_WITH_AES_128_CBC_SHA, 0x0094),
|
|
|
+ SUITE(TLS_RSA_PSK_WITH_AES_256_CBC_SHA, 0x0095),
|
|
|
+ SUITE(TLS_PSK_WITH_NULL_SHA, 0x002C),
|
|
|
+ SUITE(TLS_DHE_PSK_WITH_NULL_SHA, 0x002D),
|
|
|
+ SUITE(TLS_RSA_PSK_WITH_NULL_SHA, 0x002E),
|
|
|
+ SUITE(TLS_RSA_WITH_AES_128_GCM_SHA256, 0x009C),
|
|
|
+ SUITE(TLS_RSA_WITH_AES_256_GCM_SHA384, 0x009D),
|
|
|
+ SUITE(TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, 0x009E),
|
|
|
+ SUITE(TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, 0x009F),
|
|
|
+ SUITE(TLS_DH_RSA_WITH_AES_128_GCM_SHA256, 0x00A0),
|
|
|
+ SUITE(TLS_DH_RSA_WITH_AES_256_GCM_SHA384, 0x00A1),
|
|
|
+ SUITE(TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, 0x00A2),
|
|
|
+ SUITE(TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, 0x00A3),
|
|
|
+ SUITE(TLS_DH_DSS_WITH_AES_128_GCM_SHA256, 0x00A4),
|
|
|
+ SUITE(TLS_DH_DSS_WITH_AES_256_GCM_SHA384, 0x00A5),
|
|
|
+ SUITE(TLS_DH_anon_WITH_AES_128_GCM_SHA256, 0x00A6),
|
|
|
+ SUITE(TLS_DH_anon_WITH_AES_256_GCM_SHA384, 0x00A7),
|
|
|
+ SUITE(TLS_PSK_WITH_AES_128_GCM_SHA256, 0x00A8),
|
|
|
+ SUITE(TLS_PSK_WITH_AES_256_GCM_SHA384, 0x00A9),
|
|
|
+ SUITE(TLS_DHE_PSK_WITH_AES_128_GCM_SHA256, 0x00AA),
|
|
|
+ SUITE(TLS_DHE_PSK_WITH_AES_256_GCM_SHA384, 0x00AB),
|
|
|
+ SUITE(TLS_RSA_PSK_WITH_AES_128_GCM_SHA256, 0x00AC),
|
|
|
+ SUITE(TLS_RSA_PSK_WITH_AES_256_GCM_SHA384, 0x00AD),
|
|
|
+ SUITE(TLS_PSK_WITH_AES_128_CBC_SHA256, 0x00AE),
|
|
|
+ SUITE(TLS_PSK_WITH_AES_256_CBC_SHA384, 0x00AF),
|
|
|
+ SUITE(TLS_PSK_WITH_NULL_SHA256, 0x00B0),
|
|
|
+ SUITE(TLS_PSK_WITH_NULL_SHA384, 0x00B1),
|
|
|
+ SUITE(TLS_DHE_PSK_WITH_AES_128_CBC_SHA256, 0x00B2),
|
|
|
+ SUITE(TLS_DHE_PSK_WITH_AES_256_CBC_SHA384, 0x00B3),
|
|
|
+ SUITE(TLS_DHE_PSK_WITH_NULL_SHA256, 0x00B4),
|
|
|
+ SUITE(TLS_DHE_PSK_WITH_NULL_SHA384, 0x00B5),
|
|
|
+ SUITE(TLS_RSA_PSK_WITH_AES_128_CBC_SHA256, 0x00B6),
|
|
|
+ SUITE(TLS_RSA_PSK_WITH_AES_256_CBC_SHA384, 0x00B7),
|
|
|
+ SUITE(TLS_RSA_PSK_WITH_NULL_SHA256, 0x00B8),
|
|
|
+ SUITE(TLS_RSA_PSK_WITH_NULL_SHA384, 0x00B9),
|
|
|
+ SUITE(TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, 0xC023),
|
|
|
+ SUITE(TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, 0xC024),
|
|
|
+ SUITE(TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, 0xC025),
|
|
|
+ SUITE(TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, 0xC026),
|
|
|
+ SUITE(TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, 0xC027),
|
|
|
+ SUITE(TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, 0xC028),
|
|
|
+ SUITE(TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, 0xC029),
|
|
|
+ SUITE(TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, 0xC02A),
|
|
|
+ SUITE(TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, 0xC02B),
|
|
|
+ SUITE(TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, 0xC02C),
|
|
|
+ SUITE(TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, 0xC02D),
|
|
|
+ SUITE(TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, 0xC02E),
|
|
|
+ SUITE(TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, 0xC02F),
|
|
|
+ SUITE(TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, 0xC030),
|
|
|
+ SUITE(TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, 0xC031),
|
|
|
+ SUITE(TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, 0xC032),
|
|
|
+ SUITE(TLS_EMPTY_RENEGOTIATION_INFO_SCSV, 0x00FF),
|
|
|
+ SUITE(SSL_RSA_WITH_RC2_CBC_MD5, 0xFF80),
|
|
|
+ SUITE(SSL_RSA_WITH_IDEA_CBC_MD5, 0xFF81),
|
|
|
+ SUITE(SSL_RSA_WITH_DES_CBC_MD5, 0xFF82),
|
|
|
+ SUITE(SSL_RSA_WITH_3DES_EDE_CBC_MD5, 0xFF83),
|
|
|
+ SUITE(SSL_NO_SUCH_CIPHERSUITE, 0xFFFF)
|
|
|
+};
|
|
|
#undef SUITE
|
|
|
|
|
|
- static inline std::string suiteToString(const SSLCipherSuite suite)
|
|
|
- {
|
|
|
- for (auto & s : kSuites) {
|
|
|
- if (s.suite == suite) {
|
|
|
- return s.name;
|
|
|
- }
|
|
|
+static inline std::string suiteToString(const SSLCipherSuite suite)
|
|
|
+{
|
|
|
+ for (auto& s : kSuites) {
|
|
|
+ if (s.suite == suite) {
|
|
|
+ return s.name;
|
|
|
}
|
|
|
- std::stringstream ss;
|
|
|
- ss << "Unknown suite (0x" << std::hex << suite << ") like TLS_NULL_WITH_NULL_NULL";
|
|
|
- return ss.str();
|
|
|
}
|
|
|
+ std::stringstream ss;
|
|
|
+ ss << "Unknown suite (0x" << std::hex << suite
|
|
|
+ << ") like TLS_NULL_WITH_NULL_NULL";
|
|
|
+ return ss.str();
|
|
|
+}
|
|
|
|
|
|
- static const char* kBlocked[] = {
|
|
|
- "NULL", "anon", "MD5", "EXPORT", "DES", "IDEA", "NO_SUCH", "EMPTY", "PSK"
|
|
|
- };
|
|
|
-
|
|
|
- static inline bool isBlockedSuite(SSLCipherSuite suite)
|
|
|
- {
|
|
|
- using namespace aria2;
|
|
|
+static const char* kBlocked[] = {
|
|
|
+ "NULL", "anon", "MD5", "EXPORT", "DES", "IDEA", "NO_SUCH", "EMPTY", "PSK"
|
|
|
+};
|
|
|
|
|
|
- // Don't care about SSL2 suites!
|
|
|
- std::string name = suiteToString(suite);
|
|
|
- for (auto& blocked : kBlocked) {
|
|
|
- if (strstr(name.c_str(), blocked)) {
|
|
|
- A2_LOG_DEBUG(fmt("Removing blocked cipher suite: %s", name.c_str()));
|
|
|
- return true;
|
|
|
- }
|
|
|
+static inline bool isBlockedSuite(SSLCipherSuite suite)
|
|
|
+{
|
|
|
+ using namespace aria2;
|
|
|
+
|
|
|
+ // Don't care about SSL2 suites!
|
|
|
+ std::string name = suiteToString(suite);
|
|
|
+ for (auto& blocked : kBlocked) {
|
|
|
+ if (strstr(name.c_str(), blocked)) {
|
|
|
+ A2_LOG_DEBUG(fmt("Removing blocked cipher suite: %s", name.c_str()));
|
|
|
+ return true;
|
|
|
}
|
|
|
- return false;
|
|
|
}
|
|
|
+ return false;
|
|
|
+}
|
|
|
|
|
|
- typedef std::vector<SSLCipherSuite> SSLCipherSuiteList;
|
|
|
- static SSLCipherSuiteList constructEnabledSuites(SSLContextRef ctx)
|
|
|
- {
|
|
|
+typedef std::vector<SSLCipherSuite> SSLCipherSuiteList;
|
|
|
+static SSLCipherSuiteList constructEnabledSuites(SSLContextRef ctx)
|
|
|
+{
|
|
|
#ifndef CIPHER_CONSTRUCT_ALWAYS
|
|
|
- static
|
|
|
+ static
|
|
|
#endif
|
|
|
- SSLCipherSuiteList rv(0);
|
|
|
+ SSLCipherSuiteList rv(0);
|
|
|
|
|
|
#ifndef CIPHER_CONSTRUCT_ALWAYS
|
|
|
- if (!rv.empty()) {
|
|
|
- return rv;
|
|
|
- }
|
|
|
+ if (!rv.empty()) {
|
|
|
+ return rv;
|
|
|
+ }
|
|
|
#endif
|
|
|
|
|
|
- size_t supported = 0;
|
|
|
- OSStatus err = SSLGetNumberSupportedCiphers(ctx, &supported);
|
|
|
- if (err != noErr || !supported) {
|
|
|
- return rv;
|
|
|
- }
|
|
|
-
|
|
|
- rv.resize(supported, SSL_NO_SUCH_CIPHERSUITE);
|
|
|
- err = SSLGetSupportedCiphers(ctx, &rv[0], &supported);
|
|
|
- if (err != noErr || !supported) {
|
|
|
- rv.clear();
|
|
|
- return rv;
|
|
|
- }
|
|
|
+ size_t supported = 0;
|
|
|
+ OSStatus err = SSLGetNumberSupportedCiphers(ctx, &supported);
|
|
|
+ if (err != noErr || !supported) {
|
|
|
+ return rv;
|
|
|
+ }
|
|
|
|
|
|
- rv.erase(std::remove_if(rv.begin(), rv.end(), isBlockedSuite), rv.end());
|
|
|
+ rv.resize(supported, SSL_NO_SUCH_CIPHERSUITE);
|
|
|
+ err = SSLGetSupportedCiphers(ctx, &rv[0], &supported);
|
|
|
+ if (err != noErr || !supported) {
|
|
|
+ rv.clear();
|
|
|
return rv;
|
|
|
}
|
|
|
+
|
|
|
+ rv.erase(std::remove_if(rv.begin(), rv.end(), isBlockedSuite), rv.end());
|
|
|
+ return rv;
|
|
|
}
|
|
|
|
|
|
+} // namespace
|
|
|
+
|
|
|
namespace aria2 {
|
|
|
|
|
|
TLSSession* TLSSession::make(TLSContext* ctx)
|
|
@@ -358,12 +349,11 @@ AppleTLSSession::AppleTLSSession(AppleTLSContext* ctx)
|
|
|
writeBuffered_(0)
|
|
|
{
|
|
|
#if defined(__MAC_10_8)
|
|
|
- sslCtx_ = SSLCreateContext(
|
|
|
- nullptr,
|
|
|
- ctx->getSide() == TLS_SERVER ? kSSLServerSide : kSSLClientSide,
|
|
|
- kSSLStreamType
|
|
|
- );
|
|
|
- lastError_ = sslCtx_ ? noErr : paramErr;
|
|
|
+ sslCtx_ = SSLCreateContext(nullptr,
|
|
|
+ ctx->getSide() == TLS_SERVER ? kSSLServerSide :
|
|
|
+ kSSLClientSide,
|
|
|
+ kSSLStreamType);
|
|
|
+ lastError_ = sslCtx_ ? noErr : paramErr;
|
|
|
#else
|
|
|
lastError_ = SSLNewContext(ctx->getSide() == TLS_SERVER, &sslCtx_);
|
|
|
#endif
|
|
@@ -383,25 +373,24 @@ AppleTLSSession::AppleTLSSession(AppleTLSContext* ctx)
|
|
|
#endif
|
|
|
|
|
|
// BEAST
|
|
|
- (void)SSLSetSessionOption(
|
|
|
- sslCtx_,
|
|
|
+ (void)SSLSetSessionOption(sslCtx_,
|
|
|
#if defined(__MAC_10_9)
|
|
|
- kSSLSessionOptionSendOneByteRecord,
|
|
|
+ kSSLSessionOptionSendOneByteRecord,
|
|
|
#else
|
|
|
- (SSLSessionOption)0x4, /* kSSLSessionOptionSendOneByteRecord */
|
|
|
+ (SSLSessionOption)0x4, // kSSLSessionOptionSendOneByteRecord
|
|
|
#endif
|
|
|
- true);
|
|
|
+ true);
|
|
|
|
|
|
#if defined(__MAC_10_8)
|
|
|
if (!ctx->getVerifyPeer()) {
|
|
|
// This disables client verification
|
|
|
- (void)SSLSetSessionOption(sslCtx_, kSSLSessionOptionBreakOnServerAuth, true);
|
|
|
+ (void)SSLSetSessionOption(
|
|
|
+ sslCtx_, kSSLSessionOptionBreakOnServerAuth, true);
|
|
|
}
|
|
|
#else
|
|
|
(void)SSLSetEnableCertVerify(sslCtx_, ctx->getVerifyPeer());
|
|
|
#endif
|
|
|
|
|
|
-
|
|
|
#ifndef CIPHER_ENABLE_ALL
|
|
|
SSLCipherSuiteList enabled = constructEnabledSuites(sslCtx_);
|
|
|
if (enabled.empty()) {
|
|
@@ -409,8 +398,9 @@ AppleTLSSession::AppleTLSSession(AppleTLSContext* ctx)
|
|
|
state_ = st_error;
|
|
|
return;
|
|
|
}
|
|
|
- for (const auto& suite: enabled) {
|
|
|
- A2_LOG_INFO(fmt("AppleTLS: Enabled suite %s", suiteToString(suite).c_str()));
|
|
|
+ for (const auto& suite : enabled) {
|
|
|
+ A2_LOG_INFO(
|
|
|
+ fmt("AppleTLS: Enabled suite %s", suiteToString(suite).c_str()));
|
|
|
}
|
|
|
if (SSLSetEnabledCiphers(sslCtx_, &enabled[0], enabled.size()) != noErr) {
|
|
|
A2_LOG_ERROR("AppleTLS: Failed to set enabled ciphers list");
|
|
@@ -436,10 +426,12 @@ AppleTLSSession::AppleTLSSession(AppleTLSContext* ctx)
|
|
|
state_ = st_error;
|
|
|
return;
|
|
|
}
|
|
|
- std::unique_ptr<void, decltype(&CFRelease)> del_certs((void*)certs, CFRelease);
|
|
|
+ std::unique_ptr<void, decltype(&CFRelease)> del_certs((void*)certs,
|
|
|
+ CFRelease);
|
|
|
lastError_ = SSLSetCertificate(sslCtx_, certs);
|
|
|
if (lastError_ != noErr) {
|
|
|
- A2_LOG_ERROR(fmt("AppleTLS: Failed to set credentials: %s", getLastErrorString().c_str()));
|
|
|
+ A2_LOG_ERROR(fmt("AppleTLS: Failed to set credentials: %s",
|
|
|
+ getLastErrorString().c_str()));
|
|
|
state_ = st_error;
|
|
|
return;
|
|
|
}
|
|
@@ -447,7 +439,8 @@ AppleTLSSession::AppleTLSSession(AppleTLSContext* ctx)
|
|
|
#ifndef CIPHER_NO_DHPARAM
|
|
|
lastError_ = SSLSetDiffieHellmanParams(sslCtx_, dhparam, sizeof(dhparam));
|
|
|
if (lastError_ != noErr) {
|
|
|
- A2_LOG_WARN(fmt("AppleTLS: Failed to set DHParams: %s", getLastErrorString().c_str()));
|
|
|
+ A2_LOG_WARN(fmt("AppleTLS: Failed to set DHParams: %s",
|
|
|
+ getLastErrorString().c_str()));
|
|
|
// Engine will still generate some for us, so this is no problem, except
|
|
|
// it will take longer.
|
|
|
}
|
|
@@ -495,7 +488,8 @@ int AppleTLSSession::setSNIHostname(const std::string& hostname)
|
|
|
lastError_ = noErr;
|
|
|
return TLS_ERR_ERROR;
|
|
|
}
|
|
|
- lastError_ = SSLSetPeerDomainName(sslCtx_, hostname.c_str(), hostname.length());
|
|
|
+ lastError_ =
|
|
|
+ SSLSetPeerDomainName(sslCtx_, hostname.c_str(), hostname.length());
|
|
|
return (lastError_ != noErr) ? TLS_ERR_ERROR : TLS_ERR_OK;
|
|
|
}
|
|
|
|
|
@@ -507,10 +501,11 @@ int AppleTLSSession::closeConnection()
|
|
|
}
|
|
|
lastError_ = SSLClose(sslCtx_);
|
|
|
state_ = st_closed;
|
|
|
- return lastError_ == noErr ? TLS_ERR_OK : TLS_ERR_ERROR;
|
|
|
+ return lastError_ == noErr ? TLS_ERR_OK : TLS_ERR_ERROR;
|
|
|
}
|
|
|
|
|
|
-int AppleTLSSession::checkDirection() {
|
|
|
+int AppleTLSSession::checkDirection()
|
|
|
+{
|
|
|
// See: https://github.com/tatsuhiro-t/aria2/pull/61#issuecomment-16051793
|
|
|
if (state_ == st_connected) {
|
|
|
// Need to check read first, as SocketCore kinda expects this
|
|
@@ -539,53 +534,60 @@ ssize_t AppleTLSSession::writeData(const void* data, size_t len)
|
|
|
if (writeBuffered_) {
|
|
|
lastError_ = SSLWrite(sslCtx_, nullptr, 0, &processed);
|
|
|
switch (lastError_) {
|
|
|
- case noErr:
|
|
|
- processed = writeBuffered_;
|
|
|
- writeBuffered_ = 0;
|
|
|
- return processed;
|
|
|
- case errSSLWouldBlock:
|
|
|
- return TLS_ERR_WOULDBLOCK;
|
|
|
- case errSSLClosedGraceful:
|
|
|
- case errSSLClosedNoNotify:
|
|
|
- closeConnection();
|
|
|
- return TLS_ERR_ERROR;
|
|
|
- default:
|
|
|
- closeConnection();
|
|
|
- state_ = st_error;
|
|
|
- return TLS_ERR_ERROR;
|
|
|
- }
|
|
|
- }
|
|
|
-
|
|
|
- lastError_ = SSLWrite(sslCtx_, data, len, &processed);
|
|
|
- switch (lastError_) {
|
|
|
case noErr:
|
|
|
+ processed = writeBuffered_;
|
|
|
+ writeBuffered_ = 0;
|
|
|
return processed;
|
|
|
+
|
|
|
case errSSLWouldBlock:
|
|
|
- writeBuffered_ = len;
|
|
|
return TLS_ERR_WOULDBLOCK;
|
|
|
+
|
|
|
case errSSLClosedGraceful:
|
|
|
case errSSLClosedNoNotify:
|
|
|
closeConnection();
|
|
|
return TLS_ERR_ERROR;
|
|
|
+
|
|
|
default:
|
|
|
closeConnection();
|
|
|
state_ = st_error;
|
|
|
return TLS_ERR_ERROR;
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ lastError_ = SSLWrite(sslCtx_, data, len, &processed);
|
|
|
+ switch (lastError_) {
|
|
|
+ case noErr:
|
|
|
+ return processed;
|
|
|
+
|
|
|
+ case errSSLWouldBlock:
|
|
|
+ writeBuffered_ = len;
|
|
|
+ return TLS_ERR_WOULDBLOCK;
|
|
|
+
|
|
|
+ case errSSLClosedGraceful:
|
|
|
+ case errSSLClosedNoNotify:
|
|
|
+ closeConnection();
|
|
|
+ return TLS_ERR_ERROR;
|
|
|
+
|
|
|
+ default:
|
|
|
+ closeConnection();
|
|
|
+ state_ = st_error;
|
|
|
+ return TLS_ERR_ERROR;
|
|
|
}
|
|
|
}
|
|
|
OSStatus AppleTLSSession::sockWrite(const void* data, size_t* len)
|
|
|
{
|
|
|
size_t remain = *len;
|
|
|
- const uint8_t *buffer = static_cast<const uint8_t*>(data);
|
|
|
+ const uint8_t* buffer = static_cast<const uint8_t*>(data);
|
|
|
*len = 0;
|
|
|
while (remain) {
|
|
|
ssize_t w = write(sockfd_, buffer, remain);
|
|
|
if (w <= 0) {
|
|
|
switch (errno) {
|
|
|
- case EAGAIN:
|
|
|
- return errSSLWouldBlock;
|
|
|
- default:
|
|
|
- return errSSLClosedAbort;
|
|
|
+ case EAGAIN:
|
|
|
+ return errSSLWouldBlock;
|
|
|
+
|
|
|
+ default:
|
|
|
+ return errSSLClosedAbort;
|
|
|
}
|
|
|
}
|
|
|
remain -= w;
|
|
@@ -603,28 +605,31 @@ ssize_t AppleTLSSession::readData(void* data, size_t len)
|
|
|
size_t processed = 0;
|
|
|
lastError_ = SSLRead(sslCtx_, data, len, &processed);
|
|
|
switch (lastError_) {
|
|
|
- case noErr:
|
|
|
+ case noErr:
|
|
|
+ return processed;
|
|
|
+
|
|
|
+ case errSSLWouldBlock:
|
|
|
+ if (processed) {
|
|
|
return processed;
|
|
|
- case errSSLWouldBlock:
|
|
|
- if (processed) {
|
|
|
- return processed;
|
|
|
- }
|
|
|
- return TLS_ERR_WOULDBLOCK;
|
|
|
- case errSSLClosedGraceful:
|
|
|
- case errSSLClosedNoNotify:
|
|
|
- closeConnection();
|
|
|
- return TLS_ERR_ERROR;
|
|
|
- default:
|
|
|
- closeConnection();
|
|
|
- state_ = st_error;
|
|
|
- return TLS_ERR_ERROR;
|
|
|
+ }
|
|
|
+ return TLS_ERR_WOULDBLOCK;
|
|
|
+
|
|
|
+ case errSSLClosedGraceful:
|
|
|
+ case errSSLClosedNoNotify:
|
|
|
+ closeConnection();
|
|
|
+ return TLS_ERR_ERROR;
|
|
|
+
|
|
|
+ default:
|
|
|
+ closeConnection();
|
|
|
+ state_ = st_error;
|
|
|
+ return TLS_ERR_ERROR;
|
|
|
}
|
|
|
}
|
|
|
|
|
|
OSStatus AppleTLSSession::sockRead(void* data, size_t* len)
|
|
|
{
|
|
|
size_t remain = *len;
|
|
|
- uint8_t *buffer = static_cast<uint8_t*>(data);
|
|
|
+ uint8_t* buffer = static_cast<uint8_t*>(data);
|
|
|
*len = 0;
|
|
|
while (remain) {
|
|
|
ssize_t r = read(sockfd_, buffer, remain);
|
|
@@ -633,14 +638,17 @@ OSStatus AppleTLSSession::sockRead(void* data, size_t* len)
|
|
|
}
|
|
|
if (r < 0) {
|
|
|
switch (errno) {
|
|
|
- case ENOENT:
|
|
|
- return errSSLClosedGraceful;
|
|
|
- case ECONNRESET:
|
|
|
- return errSSLClosedAbort;
|
|
|
- case EAGAIN:
|
|
|
- return errSSLWouldBlock;
|
|
|
- default:
|
|
|
- return errSSLClosedAbort;
|
|
|
+ case ENOENT:
|
|
|
+ return errSSLClosedGraceful;
|
|
|
+
|
|
|
+ case ECONNRESET:
|
|
|
+ return errSSLClosedAbort;
|
|
|
+
|
|
|
+ case EAGAIN:
|
|
|
+ return errSSLWouldBlock;
|
|
|
+
|
|
|
+ default:
|
|
|
+ return errSSLClosedAbort;
|
|
|
}
|
|
|
}
|
|
|
remain -= r;
|
|
@@ -650,7 +658,8 @@ OSStatus AppleTLSSession::sockRead(void* data, size_t* len)
|
|
|
return noErr;
|
|
|
}
|
|
|
|
|
|
-int AppleTLSSession::tlsConnect(const std::string& hostname, std::string& handshakeErr)
|
|
|
+int AppleTLSSession::tlsConnect(const std::string& hostname,
|
|
|
+ std::string& handshakeErr)
|
|
|
{
|
|
|
if (state_ != st_initialized) {
|
|
|
return TLS_ERR_ERROR;
|
|
@@ -660,15 +669,18 @@ int AppleTLSSession::tlsConnect(const std::string& hostname, std::string& handsh
|
|
|
}
|
|
|
lastError_ = SSLHandshake(sslCtx_);
|
|
|
switch (lastError_) {
|
|
|
- case noErr:
|
|
|
- break;
|
|
|
- case errSSLWouldBlock:
|
|
|
- return TLS_ERR_WOULDBLOCK;
|
|
|
- case errSSLServerAuthCompleted:
|
|
|
- return tlsConnect(hostname, handshakeErr);
|
|
|
- default:
|
|
|
- handshakeErr = getLastErrorString();
|
|
|
- return TLS_ERR_ERROR;
|
|
|
+ case noErr:
|
|
|
+ break;
|
|
|
+
|
|
|
+ case errSSLWouldBlock:
|
|
|
+ return TLS_ERR_WOULDBLOCK;
|
|
|
+
|
|
|
+ case errSSLServerAuthCompleted:
|
|
|
+ return tlsConnect(hostname, handshakeErr);
|
|
|
+
|
|
|
+ default:
|
|
|
+ handshakeErr = getLastErrorString();
|
|
|
+ return TLS_ERR_ERROR;
|
|
|
}
|
|
|
state_ = st_connected;
|
|
|
|
|
@@ -693,54 +705,75 @@ int AppleTLSSession::tlsAccept()
|
|
|
std::string AppleTLSSession::getLastErrorString()
|
|
|
{
|
|
|
switch (lastError_) {
|
|
|
- case errSSLProtocol:
|
|
|
- return "Protocol error";
|
|
|
- case errSSLNegotiation:
|
|
|
- return "No common cipher suites";
|
|
|
- case errSSLFatalAlert:
|
|
|
- return "Received fatal alert";
|
|
|
- case errSSLSessionNotFound:
|
|
|
- return "Unknown session";
|
|
|
- case errSSLClosedGraceful:
|
|
|
- return "Closed gracefully";
|
|
|
- case errSSLClosedAbort:
|
|
|
- return "Connection aborted";
|
|
|
- case errSSLXCertChainInvalid:
|
|
|
- return "Invalid certificate chain";
|
|
|
- case errSSLBadCert:
|
|
|
- return "Invalid certificate format";
|
|
|
- case errSSLCrypto:
|
|
|
- return "Cryptographic error";
|
|
|
- case paramErr:
|
|
|
- case errSSLInternal:
|
|
|
- return "Internal SSL error";
|
|
|
- case errSSLUnknownRootCert:
|
|
|
- return "Self-signed certificate";
|
|
|
- case errSSLNoRootCert:
|
|
|
- return "No root certificate";
|
|
|
- case errSSLCertExpired:
|
|
|
- return "Certificate expired";
|
|
|
- case errSSLCertNotYetValid:
|
|
|
- return "Certificate not yet valid";
|
|
|
- case errSSLClosedNoNotify:
|
|
|
- return "Closed without notification";
|
|
|
- case errSSLBufferOverflow:
|
|
|
- return "Buffer not large enough";
|
|
|
- case errSSLBadCipherSuite:
|
|
|
- return "Bad cipher suite";
|
|
|
- case errSSLPeerUnexpectedMsg:
|
|
|
- return "Unexpected peer message";
|
|
|
- case errSSLPeerBadRecordMac:
|
|
|
- return "Bad MAC";
|
|
|
- case errSSLPeerDecryptionFail:
|
|
|
- return "Decryption failure";
|
|
|
- case errSSLHostNameMismatch:
|
|
|
- return "Invalid hostname";
|
|
|
- case errSSLConnectionRefused:
|
|
|
- return "Connection refused";
|
|
|
- default:
|
|
|
- return fmt("Unspecified error %ld", (long)lastError_);
|
|
|
- }
|
|
|
-}
|
|
|
+ case errSSLProtocol:
|
|
|
+ return "Protocol error";
|
|
|
+
|
|
|
+ case errSSLNegotiation:
|
|
|
+ return "No common cipher suites";
|
|
|
+
|
|
|
+ case errSSLFatalAlert:
|
|
|
+ return "Received fatal alert";
|
|
|
+
|
|
|
+ case errSSLSessionNotFound:
|
|
|
+ return "Unknown session";
|
|
|
+
|
|
|
+ case errSSLClosedGraceful:
|
|
|
+ return "Closed gracefully";
|
|
|
+
|
|
|
+ case errSSLClosedAbort:
|
|
|
+ return "Connection aborted";
|
|
|
+
|
|
|
+ case errSSLXCertChainInvalid:
|
|
|
+ return "Invalid certificate chain";
|
|
|
+
|
|
|
+ case errSSLBadCert:
|
|
|
+ return "Invalid certificate format";
|
|
|
+
|
|
|
+ case errSSLCrypto:
|
|
|
+ return "Cryptographic error";
|
|
|
+
|
|
|
+ case paramErr:
|
|
|
+ case errSSLInternal:
|
|
|
+ return "Internal SSL error";
|
|
|
|
|
|
+ case errSSLUnknownRootCert:
|
|
|
+ return "Self-signed certificate";
|
|
|
+
|
|
|
+ case errSSLNoRootCert:
|
|
|
+ return "No root certificate";
|
|
|
+
|
|
|
+ case errSSLCertExpired:
|
|
|
+ return "Certificate expired";
|
|
|
+
|
|
|
+ case errSSLCertNotYetValid:
|
|
|
+ return "Certificate not yet valid";
|
|
|
+
|
|
|
+ case errSSLClosedNoNotify:
|
|
|
+ return "Closed without notification";
|
|
|
+
|
|
|
+ case errSSLBufferOverflow:
|
|
|
+ return "Buffer not large enough";
|
|
|
+
|
|
|
+ case errSSLBadCipherSuite:
|
|
|
+ return "Bad cipher suite";
|
|
|
+
|
|
|
+ case errSSLPeerUnexpectedMsg:
|
|
|
+ return "Unexpected peer message";
|
|
|
+
|
|
|
+ case errSSLPeerBadRecordMac:
|
|
|
+ return "Bad MAC";
|
|
|
+
|
|
|
+ case errSSLPeerDecryptionFail:
|
|
|
+ return "Decryption failure";
|
|
|
+
|
|
|
+ case errSSLHostNameMismatch:
|
|
|
+ return "Invalid hostname";
|
|
|
+
|
|
|
+ case errSSLConnectionRefused:
|
|
|
+ return "Connection refused";
|
|
|
+
|
|
|
+ default:
|
|
|
+ return fmt("Unspecified error %ld", (long)lastError_);
|
|
|
+ }
|
|
|
}
|
|
|
+} // namespace aria2
|