AppleTLSSession.cc 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855
  1. /* <!-- copyright */
  2. /*
  3. * aria2 - The high speed download utility
  4. *
  5. * Copyright (C) 2013 Nils Maier
  6. *
  7. * This program is free software; you can redistribute it and/or modify
  8. * it under the terms of the GNU General Public License as published by
  9. * the Free Software Foundation; either version 2 of the License, or
  10. * (at your option) any later version.
  11. *
  12. * This program is distributed in the hope that it will be useful,
  13. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  15. * GNU General Public License for more details.
  16. *
  17. * You should have received a copy of the GNU General Public License
  18. * along with this program; if not, write to the Free Software
  19. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
  20. *
  21. * In addition, as a special exception, the copyright holders give
  22. * permission to link the code of portions of this program with the
  23. * OpenSSL library under certain conditions as described in each
  24. * individual source file, and distribute linked combinations
  25. * including the two.
  26. * You must obey the GNU General Public License in all respects
  27. * for all of the code used other than OpenSSL. If you modify
  28. * file(s) with this exception, you may extend this exception to your
  29. * version of the file(s), but you are not obligated to do so. If you
  30. * do not wish to do so, delete this exception statement from your
  31. * version. If you delete this exception statement from all source
  32. * files in the program, then also delete it here.
  33. */
  34. /* copyright --> */
  35. #include "AppleTLSSession.h"
  36. #include <sstream>
  37. #include <vector>
  38. #include <CoreFoundation/CoreFoundation.h>
  39. #include "LogFactory.h"
  40. #include "a2functional.h"
  41. #include "fmt.h"
  42. #define ioErr -36
  43. #define paramErr -50
  44. #ifndef errSSLServerAuthCompleted
  45. # define errSSLServerAuthCompleted -9841
  46. #endif
  47. namespace {
  48. #if !defined(__MAC_10_8)
  49. static const SSLProtocol kTLSProtocol11 = 7;
  50. static const SSLProtocol kTLSProtocol12 = 8;
  51. static const SSLProtocol kTLSProtocol13 = 13;
  52. #endif
  53. #ifndef CIPHER_NO_DHPARAM
  54. // Diffie-Hellman params, to seed the engine instead of having it spend up
  55. // to 30 seconds on generating them. It should be save to share these. :p
  56. // This was generated using: openssl dhparam -outform DER 2048
  57. static const uint8_t dhparam[] =
  58. "\x30\x82\x01\x08\x02\x82\x01\x01\x00\x97\xea\xd0\x46\xf7\xae\xa7\x76\x80"
  59. "\x9c\x74\x56\x98\xd8\x56\x97\x2b\x20\x6c\x77\xe2\x82\xbb\xc8\x84\xbe\xe7"
  60. "\x63\xaf\xcc\x30\xd0\x67\x97\x7d\x1b\xab\x59\x30\xa9\x13\x67\x21\xd7\xd4"
  61. "\x0e\x46\xcf\xe5\x80\xdf\xc9\xb9\xba\x54\x9b\x46\x2f\x3b\x45\xfc\x2f\xaf"
  62. "\xad\xc0\x17\x56\xdd\x52\x42\x57\x45\x70\x14\xe5\xbe\x67\xaa\xde\x69\x75"
  63. "\x30\x0d\xf9\xa2\xc4\x63\x4d\x7a\x39\xef\x14\x62\x18\x33\x44\xa1\xf9\xc1"
  64. "\x52\xd1\xb6\x72\x21\x98\xf8\xab\x16\x1b\x7b\x37\x65\xe3\xc5\x11\x00\xf6"
  65. "\x36\x1f\xd8\x5f\xd8\x9f\x43\xa8\xce\x9d\xbf\x5e\xd6\x2d\xfa\x0a\xc2\x01"
  66. "\x54\xc2\xd9\x81\x54\x55\xb5\x26\xf8\x88\x37\xf5\xfe\xe0\xef\x4a\x34\x81"
  67. "\xdc\x5a\xb3\x71\x46\x27\xe3\xcd\x24\xf6\x1b\xf1\xe2\x0f\xc2\xa1\x39\x53"
  68. "\x5b\xc5\x38\x46\x8e\x67\x4c\xd9\xdd\xe4\x37\x06\x03\x16\xf1\x1d\x7a\xba"
  69. "\x2d\xc1\xe4\x03\x1a\x58\xe5\x29\x5a\x29\x06\x69\x61\x7a\xd8\xa9\x05\x9f"
  70. "\xc1\xa2\x45\x9c\x17\xad\x52\x69\x33\xdc\x18\x8d\x15\xa6\x5e\xcd\x94\xf4"
  71. "\x45\xbb\x9f\xc2\x7b\x85\x00\x61\xb0\x1a\xdc\x3c\x86\xaa\x9f\x5c\x04\xb3"
  72. "\x90\x0b\x35\x64\xff\xd9\xe3\xac\xf2\xf2\xeb\x3a\x63\x02\x01\x02";
  73. #endif // CIPHER_NO_DHPARAM
  74. static inline const char* protoToString(SSLProtocol proto)
  75. {
  76. switch (proto) {
  77. case kSSLProtocol2:
  78. return "SSLv2 (!)";
  79. case kSSLProtocol3:
  80. return "SSLv3 (!)";
  81. case kTLSProtocol1:
  82. return "TLSv1";
  83. case kTLSProtocol11:
  84. return "TLSv1.1";
  85. case kTLSProtocol12:
  86. return "TLSv1.2";
  87. case kTLSProtocol13:
  88. return "TLSv1.3";
  89. default:
  90. return "Unknown";
  91. }
  92. }
  93. #define SUITE(s, n) \
  94. { \
  95. n, #s \
  96. }
  97. static struct {
  98. SSLCipherSuite suite;
  99. const char* name;
  100. } kSuites[] = {
  101. // From CipherSuite.h (10.11)
  102. SUITE(SSL_NULL_WITH_NULL_NULL, 0x0000),
  103. SUITE(SSL_RSA_WITH_NULL_MD5, 0x0001),
  104. SUITE(SSL_RSA_WITH_NULL_SHA, 0x0002),
  105. SUITE(SSL_RSA_EXPORT_WITH_RC4_40_MD5, 0x0003),
  106. SUITE(SSL_RSA_WITH_RC4_128_MD5, 0x0004),
  107. SUITE(SSL_RSA_WITH_RC4_128_SHA, 0x0005),
  108. SUITE(SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5, 0x0006),
  109. SUITE(SSL_RSA_WITH_IDEA_CBC_SHA, 0x0007),
  110. SUITE(SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, 0x0008),
  111. SUITE(SSL_RSA_WITH_DES_CBC_SHA, 0x0009),
  112. SUITE(SSL_RSA_WITH_3DES_EDE_CBC_SHA, 0x000A),
  113. SUITE(SSL_DH_DSS_EXPORT_WITH_DES40_CBC_SHA, 0x000B),
  114. SUITE(SSL_DH_DSS_WITH_DES_CBC_SHA, 0x000C),
  115. SUITE(SSL_DH_DSS_WITH_3DES_EDE_CBC_SHA, 0x000D),
  116. SUITE(SSL_DH_RSA_EXPORT_WITH_DES40_CBC_SHA, 0x000E),
  117. SUITE(SSL_DH_RSA_WITH_DES_CBC_SHA, 0x000F),
  118. SUITE(SSL_DH_RSA_WITH_3DES_EDE_CBC_SHA, 0x0010),
  119. SUITE(SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, 0x0011),
  120. SUITE(SSL_DHE_DSS_WITH_DES_CBC_SHA, 0x0012),
  121. SUITE(SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, 0x0013),
  122. SUITE(SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, 0x0014),
  123. SUITE(SSL_DHE_RSA_WITH_DES_CBC_SHA, 0x0015),
  124. SUITE(SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, 0x0016),
  125. SUITE(SSL_DH_anon_EXPORT_WITH_RC4_40_MD5, 0x0017),
  126. SUITE(SSL_DH_anon_WITH_RC4_128_MD5, 0x0018),
  127. SUITE(SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA, 0x0019),
  128. SUITE(SSL_DH_anon_WITH_DES_CBC_SHA, 0x001A),
  129. SUITE(SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, 0x001B),
  130. SUITE(SSL_FORTEZZA_DMS_WITH_NULL_SHA, 0x001C),
  131. SUITE(SSL_FORTEZZA_DMS_WITH_FORTEZZA_CBC_SHA, 0x001D),
  132. SUITE(TLS_RSA_WITH_AES_128_CBC_SHA, 0x002F),
  133. SUITE(TLS_DH_DSS_WITH_AES_128_CBC_SHA, 0x0030),
  134. SUITE(TLS_DH_RSA_WITH_AES_128_CBC_SHA, 0x0031),
  135. SUITE(TLS_DHE_DSS_WITH_AES_128_CBC_SHA, 0x0032),
  136. SUITE(TLS_DHE_RSA_WITH_AES_128_CBC_SHA, 0x0033),
  137. SUITE(TLS_DH_anon_WITH_AES_128_CBC_SHA, 0x0034),
  138. SUITE(TLS_RSA_WITH_AES_256_CBC_SHA, 0x0035),
  139. SUITE(TLS_DH_DSS_WITH_AES_256_CBC_SHA, 0x0036),
  140. SUITE(TLS_DH_RSA_WITH_AES_256_CBC_SHA, 0x0037),
  141. SUITE(TLS_DHE_DSS_WITH_AES_256_CBC_SHA, 0x0038),
  142. SUITE(TLS_DHE_RSA_WITH_AES_256_CBC_SHA, 0x0039),
  143. SUITE(TLS_DH_anon_WITH_AES_256_CBC_SHA, 0x003A),
  144. SUITE(TLS_ECDH_ECDSA_WITH_NULL_SHA, 0xC001),
  145. SUITE(TLS_ECDH_ECDSA_WITH_RC4_128_SHA, 0xC002),
  146. SUITE(TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, 0xC003),
  147. SUITE(TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, 0xC004),
  148. SUITE(TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, 0xC005),
  149. SUITE(TLS_ECDHE_ECDSA_WITH_NULL_SHA, 0xC006),
  150. SUITE(TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, 0xC007),
  151. SUITE(TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, 0xC008),
  152. SUITE(TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, 0xC009),
  153. SUITE(TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, 0xC00A),
  154. SUITE(TLS_ECDH_RSA_WITH_NULL_SHA, 0xC00B),
  155. SUITE(TLS_ECDH_RSA_WITH_RC4_128_SHA, 0xC00C),
  156. SUITE(TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, 0xC00D),
  157. SUITE(TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, 0xC00E),
  158. SUITE(TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, 0xC00F),
  159. SUITE(TLS_ECDHE_RSA_WITH_NULL_SHA, 0xC010),
  160. SUITE(TLS_ECDHE_RSA_WITH_RC4_128_SHA, 0xC011),
  161. SUITE(TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, 0xC012),
  162. SUITE(TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, 0xC013),
  163. SUITE(TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, 0xC014),
  164. SUITE(TLS_ECDH_anon_WITH_NULL_SHA, 0xC015),
  165. SUITE(TLS_ECDH_anon_WITH_RC4_128_SHA, 0xC016),
  166. SUITE(TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA, 0xC017),
  167. SUITE(TLS_ECDH_anon_WITH_AES_128_CBC_SHA, 0xC018),
  168. SUITE(TLS_ECDH_anon_WITH_AES_256_CBC_SHA, 0xC019),
  169. SUITE(TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA, 0xC035),
  170. SUITE(TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA, 0xC036),
  171. SUITE(TLS_PSK_WITH_CHACHA20_POLY1305_SHA256, 0xCCAB),
  172. SUITE(TLS_NULL_WITH_NULL_NULL, 0x0000),
  173. SUITE(TLS_RSA_WITH_NULL_MD5, 0x0001),
  174. SUITE(TLS_RSA_WITH_NULL_SHA, 0x0002),
  175. SUITE(TLS_RSA_WITH_RC4_128_MD5, 0x0004),
  176. SUITE(TLS_RSA_WITH_RC4_128_SHA, 0x0005),
  177. SUITE(TLS_RSA_WITH_3DES_EDE_CBC_SHA, 0x000A),
  178. SUITE(TLS_RSA_WITH_AES_128_CBC_SHA, 0x002F),
  179. SUITE(TLS_RSA_WITH_AES_256_CBC_SHA, 0x0035),
  180. SUITE(TLS_RSA_WITH_NULL_SHA256, 0x003B),
  181. SUITE(TLS_RSA_WITH_AES_128_CBC_SHA256, 0x003C),
  182. SUITE(TLS_RSA_WITH_AES_256_CBC_SHA256, 0x003D),
  183. SUITE(TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA, 0x000D),
  184. SUITE(TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA, 0x0010),
  185. SUITE(TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA, 0x0013),
  186. SUITE(TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA, 0x0016),
  187. SUITE(TLS_DH_DSS_WITH_AES_128_CBC_SHA, 0x0030),
  188. SUITE(TLS_DH_RSA_WITH_AES_128_CBC_SHA, 0x0031),
  189. SUITE(TLS_DHE_DSS_WITH_AES_128_CBC_SHA, 0x0032),
  190. SUITE(TLS_DHE_RSA_WITH_AES_128_CBC_SHA, 0x0033),
  191. SUITE(TLS_DH_DSS_WITH_AES_256_CBC_SHA, 0x0036),
  192. SUITE(TLS_DH_RSA_WITH_AES_256_CBC_SHA, 0x0037),
  193. SUITE(TLS_DHE_DSS_WITH_AES_256_CBC_SHA, 0x0038),
  194. SUITE(TLS_DHE_RSA_WITH_AES_256_CBC_SHA, 0x0039),
  195. SUITE(TLS_DH_DSS_WITH_AES_128_CBC_SHA256, 0x003E),
  196. SUITE(TLS_DH_RSA_WITH_AES_128_CBC_SHA256, 0x003F),
  197. SUITE(TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, 0x0040),
  198. SUITE(TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, 0x0067),
  199. SUITE(TLS_DH_DSS_WITH_AES_256_CBC_SHA256, 0x0068),
  200. SUITE(TLS_DH_RSA_WITH_AES_256_CBC_SHA256, 0x0069),
  201. SUITE(TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, 0x006A),
  202. SUITE(TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, 0x006B),
  203. SUITE(TLS_DH_anon_WITH_RC4_128_MD5, 0x0018),
  204. SUITE(TLS_DH_anon_WITH_3DES_EDE_CBC_SHA, 0x001B),
  205. SUITE(TLS_DH_anon_WITH_AES_128_CBC_SHA, 0x0034),
  206. SUITE(TLS_DH_anon_WITH_AES_256_CBC_SHA, 0x003A),
  207. SUITE(TLS_DH_anon_WITH_AES_128_CBC_SHA256, 0x006C),
  208. SUITE(TLS_DH_anon_WITH_AES_256_CBC_SHA256, 0x006D),
  209. SUITE(TLS_PSK_WITH_RC4_128_SHA, 0x008A),
  210. SUITE(TLS_PSK_WITH_3DES_EDE_CBC_SHA, 0x008B),
  211. SUITE(TLS_PSK_WITH_AES_128_CBC_SHA, 0x008C),
  212. SUITE(TLS_PSK_WITH_AES_256_CBC_SHA, 0x008D),
  213. SUITE(TLS_DHE_PSK_WITH_RC4_128_SHA, 0x008E),
  214. SUITE(TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA, 0x008F),
  215. SUITE(TLS_DHE_PSK_WITH_AES_128_CBC_SHA, 0x0090),
  216. SUITE(TLS_DHE_PSK_WITH_AES_256_CBC_SHA, 0x0091),
  217. SUITE(TLS_RSA_PSK_WITH_RC4_128_SHA, 0x0092),
  218. SUITE(TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA, 0x0093),
  219. SUITE(TLS_RSA_PSK_WITH_AES_128_CBC_SHA, 0x0094),
  220. SUITE(TLS_RSA_PSK_WITH_AES_256_CBC_SHA, 0x0095),
  221. SUITE(TLS_PSK_WITH_NULL_SHA, 0x002C),
  222. SUITE(TLS_DHE_PSK_WITH_NULL_SHA, 0x002D),
  223. SUITE(TLS_RSA_PSK_WITH_NULL_SHA, 0x002E),
  224. SUITE(TLS_RSA_WITH_AES_128_GCM_SHA256, 0x009C),
  225. SUITE(TLS_RSA_WITH_AES_256_GCM_SHA384, 0x009D),
  226. SUITE(TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, 0x009E),
  227. SUITE(TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, 0x009F),
  228. SUITE(TLS_DH_RSA_WITH_AES_128_GCM_SHA256, 0x00A0),
  229. SUITE(TLS_DH_RSA_WITH_AES_256_GCM_SHA384, 0x00A1),
  230. SUITE(TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, 0x00A2),
  231. SUITE(TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, 0x00A3),
  232. SUITE(TLS_DH_DSS_WITH_AES_128_GCM_SHA256, 0x00A4),
  233. SUITE(TLS_DH_DSS_WITH_AES_256_GCM_SHA384, 0x00A5),
  234. SUITE(TLS_DH_anon_WITH_AES_128_GCM_SHA256, 0x00A6),
  235. SUITE(TLS_DH_anon_WITH_AES_256_GCM_SHA384, 0x00A7),
  236. SUITE(TLS_PSK_WITH_AES_128_GCM_SHA256, 0x00A8),
  237. SUITE(TLS_PSK_WITH_AES_256_GCM_SHA384, 0x00A9),
  238. SUITE(TLS_DHE_PSK_WITH_AES_128_GCM_SHA256, 0x00AA),
  239. SUITE(TLS_DHE_PSK_WITH_AES_256_GCM_SHA384, 0x00AB),
  240. SUITE(TLS_RSA_PSK_WITH_AES_128_GCM_SHA256, 0x00AC),
  241. SUITE(TLS_RSA_PSK_WITH_AES_256_GCM_SHA384, 0x00AD),
  242. SUITE(TLS_PSK_WITH_AES_128_CBC_SHA256, 0x00AE),
  243. SUITE(TLS_PSK_WITH_AES_256_CBC_SHA384, 0x00AF),
  244. SUITE(TLS_PSK_WITH_NULL_SHA256, 0x00B0),
  245. SUITE(TLS_PSK_WITH_NULL_SHA384, 0x00B1),
  246. SUITE(TLS_DHE_PSK_WITH_AES_128_CBC_SHA256, 0x00B2),
  247. SUITE(TLS_DHE_PSK_WITH_AES_256_CBC_SHA384, 0x00B3),
  248. SUITE(TLS_DHE_PSK_WITH_NULL_SHA256, 0x00B4),
  249. SUITE(TLS_DHE_PSK_WITH_NULL_SHA384, 0x00B5),
  250. SUITE(TLS_RSA_PSK_WITH_AES_128_CBC_SHA256, 0x00B6),
  251. SUITE(TLS_RSA_PSK_WITH_AES_256_CBC_SHA384, 0x00B7),
  252. SUITE(TLS_RSA_PSK_WITH_NULL_SHA256, 0x00B8),
  253. SUITE(TLS_RSA_PSK_WITH_NULL_SHA384, 0x00B9),
  254. SUITE(TLS_AES_128_GCM_SHA256, 0x1301),
  255. SUITE(TLS_AES_256_GCM_SHA384, 0x1302),
  256. SUITE(TLS_CHACHA20_POLY1305_SHA256, 0x1303),
  257. SUITE(TLS_AES_128_CCM_SHA256, 0x1304),
  258. SUITE(TLS_AES_128_CCM_8_SHA256, 0x1305),
  259. SUITE(TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, 0xC023),
  260. SUITE(TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, 0xC024),
  261. SUITE(TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, 0xC025),
  262. SUITE(TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, 0xC026),
  263. SUITE(TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, 0xC027),
  264. SUITE(TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, 0xC028),
  265. SUITE(TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, 0xC029),
  266. SUITE(TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, 0xC02A),
  267. SUITE(TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, 0xC02B),
  268. SUITE(TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, 0xC02C),
  269. SUITE(TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, 0xC02D),
  270. SUITE(TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, 0xC02E),
  271. SUITE(TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, 0xC02F),
  272. SUITE(TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, 0xC030),
  273. SUITE(TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, 0xC031),
  274. SUITE(TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, 0xC032),
  275. SUITE(TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, 0xCCA8),
  276. SUITE(TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, 0xCCA9),
  277. SUITE(SSL_RSA_WITH_RC2_CBC_MD5, 0xFF80),
  278. SUITE(SSL_RSA_WITH_IDEA_CBC_MD5, 0xFF81),
  279. SUITE(SSL_RSA_WITH_DES_CBC_MD5, 0xFF82),
  280. SUITE(SSL_RSA_WITH_3DES_EDE_CBC_MD5, 0xFF83),
  281. SUITE(SSL_NO_SUCH_CIPHERSUITE, 0xFFFF)};
  282. #undef SUITE
  283. static inline std::string suiteToString(const SSLCipherSuite suite)
  284. {
  285. for (auto& s : kSuites) {
  286. if (s.suite == suite) {
  287. return s.name;
  288. }
  289. }
  290. std::stringstream ss;
  291. ss << "Unknown suite (0x" << std::hex << suite
  292. << ") like TLS_NULL_WITH_NULL_NULL";
  293. return ss.str();
  294. }
  295. static const char* kBlocked[] = {"NULL", "anon", "MD5", "EXPORT",
  296. "DES", "IDEA", "NO_SUCH", "PSK"};
  297. static inline bool isBlockedSuite(SSLCipherSuite suite)
  298. {
  299. using namespace aria2;
  300. // Don't care about SSL2 suites!
  301. std::string name = suiteToString(suite);
  302. for (auto& blocked : kBlocked) {
  303. if (strstr(name.c_str(), blocked)) {
  304. A2_LOG_DEBUG(fmt("Removing blocked cipher suite: %s", name.c_str()));
  305. return true;
  306. }
  307. }
  308. return false;
  309. }
  310. typedef std::vector<SSLCipherSuite> SSLCipherSuiteList;
  311. static SSLCipherSuiteList constructEnabledSuites(SSLContextRef ctx)
  312. {
  313. #ifndef CIPHER_CONSTRUCT_ALWAYS
  314. static
  315. #endif
  316. SSLCipherSuiteList rv(0);
  317. #ifndef CIPHER_CONSTRUCT_ALWAYS
  318. if (!rv.empty()) {
  319. return rv;
  320. }
  321. #endif
  322. size_t supported = 0;
  323. OSStatus err = SSLGetNumberSupportedCiphers(ctx, &supported);
  324. if (err != noErr || !supported) {
  325. return rv;
  326. }
  327. rv.resize(supported, SSL_NO_SUCH_CIPHERSUITE);
  328. err = SSLGetSupportedCiphers(ctx, &rv[0], &supported);
  329. if (err != noErr || !supported) {
  330. rv.clear();
  331. return rv;
  332. }
  333. rv.erase(std::remove_if(std::begin(rv), std::end(rv), isBlockedSuite),
  334. std::end(rv));
  335. return rv;
  336. }
  337. } // namespace
  338. namespace aria2 {
  339. TLSSession* TLSSession::make(TLSContext* ctx)
  340. {
  341. return new AppleTLSSession(static_cast<AppleTLSContext*>(ctx));
  342. }
  343. AppleTLSSession::AppleTLSSession(AppleTLSContext* ctx)
  344. : sslCtx_(nullptr),
  345. sockfd_(0),
  346. state_(st_constructed),
  347. lastError_(noErr),
  348. writeBuffered_(0)
  349. {
  350. #if defined(__MAC_10_8)
  351. sslCtx_ = SSLCreateContext(
  352. nullptr, ctx->getSide() == TLS_SERVER ? kSSLServerSide : kSSLClientSide,
  353. kSSLStreamType);
  354. lastError_ = sslCtx_ ? noErr : paramErr;
  355. #else
  356. lastError_ = SSLNewContext(ctx->getSide() == TLS_SERVER, &sslCtx_);
  357. #endif
  358. if (lastError_ != noErr) {
  359. state_ = st_error;
  360. return;
  361. }
  362. #if defined(__MAC_10_8)
  363. switch (ctx->getMinTLSVersion()) {
  364. case TLS_PROTO_TLS11:
  365. (void)SSLSetProtocolVersionMin(sslCtx_, kTLSProtocol11);
  366. break;
  367. case TLS_PROTO_TLS12:
  368. (void)SSLSetProtocolVersionMin(sslCtx_, kTLSProtocol12);
  369. break;
  370. case TLS_PROTO_TLS13:
  371. (void)SSLSetProtocolVersionMin(sslCtx_, kTLSProtocol13);
  372. break;
  373. default:
  374. break;
  375. }
  376. #else
  377. (void)SSLSetProtocolVersionEnabled(sslCtx_, kSSLProtocolAll, false);
  378. switch (ctx->getMinTLSVersion()) {
  379. case TLS_PROTO_TLS11:
  380. (void)SSLSetProtocolVersionEnabled(sslCtx_, kTLSProtocol11, true);
  381. // fall through
  382. case TLS_PROTO_TLS12:
  383. (void)SSLSetProtocolVersionEnabled(sslCtx_, kTLSProtocol12, true);
  384. // fall through
  385. case TLS_PROTO_TLS13:
  386. (void)SSLSetProtocolVersionEnabled(sslCtx_, kTLSProtocol13, true);
  387. default:
  388. break;
  389. }
  390. #endif
  391. // BEAST
  392. (void)SSLSetSessionOption(sslCtx_,
  393. #if defined(__MAC_10_9)
  394. kSSLSessionOptionSendOneByteRecord,
  395. #else
  396. (SSLSessionOption)0x4, // kSSLSessionOptionSendOneByteRecord
  397. #endif
  398. true);
  399. // False Start, if available
  400. #if defined(__MAC_10_9)
  401. (void)SSLSetSessionOption(sslCtx_, kSSLSessionOptionFalseStart, true);
  402. #endif
  403. #if defined(__MAC_10_8)
  404. if (!ctx->getVerifyPeer()) {
  405. // This disables client verification
  406. (void)SSLSetSessionOption(sslCtx_, kSSLSessionOptionBreakOnServerAuth,
  407. true);
  408. }
  409. #else
  410. (void)SSLSetEnableCertVerify(sslCtx_, ctx->getVerifyPeer());
  411. #endif
  412. #ifndef CIPHER_ENABLE_ALL
  413. SSLCipherSuiteList enabled = constructEnabledSuites(sslCtx_);
  414. if (enabled.empty()) {
  415. A2_LOG_ERROR("AppleTLS: Failed to construct enabled ciphers list");
  416. state_ = st_error;
  417. return;
  418. }
  419. for (const auto& suite : enabled) {
  420. A2_LOG_DEBUG(
  421. fmt("AppleTLS: Enabled suite %s", suiteToString(suite).c_str()));
  422. }
  423. if (SSLSetEnabledCiphers(sslCtx_, &enabled[0], enabled.size()) != noErr) {
  424. A2_LOG_ERROR("AppleTLS: Failed to set enabled ciphers list");
  425. state_ = st_error;
  426. return;
  427. }
  428. #endif
  429. SecIdentityRef creds = ctx->getCredentials();
  430. if (!creds) {
  431. if (ctx->getSide() != TLS_SERVER) {
  432. // Done with client-only initialization
  433. return;
  434. }
  435. A2_LOG_ERROR("AppleTLS: No credentials");
  436. state_ = st_error;
  437. return;
  438. }
  439. CFArrayRef certs = CFArrayCreate(nullptr, (const void**)&creds, 1, nullptr);
  440. if (!certs) {
  441. A2_LOG_ERROR("AppleTLS: Failed to setup credentials");
  442. state_ = st_error;
  443. return;
  444. }
  445. std::unique_ptr<void, decltype(&CFRelease)> del_certs((void*)certs,
  446. CFRelease);
  447. lastError_ = SSLSetCertificate(sslCtx_, certs);
  448. if (lastError_ != noErr) {
  449. A2_LOG_ERROR(fmt("AppleTLS: Failed to set credentials: %s",
  450. getLastErrorString().c_str()));
  451. state_ = st_error;
  452. return;
  453. }
  454. #ifndef CIPHER_NO_DHPARAM
  455. lastError_ = SSLSetDiffieHellmanParams(sslCtx_, dhparam, sizeof(dhparam));
  456. if (lastError_ != noErr) {
  457. A2_LOG_WARN(fmt("AppleTLS: Failed to set DHParams: %s",
  458. getLastErrorString().c_str()));
  459. // Engine will still generate some for us, so this is no problem, except
  460. // it will take longer.
  461. }
  462. #endif // CIPHER_NO_DHPARAM
  463. }
  464. AppleTLSSession::~AppleTLSSession()
  465. {
  466. closeConnection();
  467. if (sslCtx_) {
  468. #if defined(__MAC_10_8)
  469. CFRelease(sslCtx_);
  470. #else
  471. SSLDisposeContext(sslCtx_);
  472. #endif
  473. sslCtx_ = nullptr;
  474. }
  475. state_ = st_error;
  476. }
  477. int AppleTLSSession::init(sock_t sockfd)
  478. {
  479. if (state_ != st_constructed) {
  480. lastError_ = noErr;
  481. return TLS_ERR_ERROR;
  482. }
  483. sockfd_ = sockfd;
  484. lastError_ = SSLSetIOFuncs(sslCtx_, SocketRead, SocketWrite);
  485. if (lastError_ != noErr) {
  486. state_ = st_error;
  487. return TLS_ERR_ERROR;
  488. }
  489. lastError_ = SSLSetConnection(sslCtx_, this);
  490. if (lastError_ != noErr) {
  491. state_ = st_error;
  492. return TLS_ERR_ERROR;
  493. }
  494. state_ = st_initialized;
  495. return TLS_ERR_OK;
  496. }
  497. int AppleTLSSession::setSNIHostname(const std::string& hostname)
  498. {
  499. if (state_ != st_initialized) {
  500. lastError_ = noErr;
  501. return TLS_ERR_ERROR;
  502. }
  503. lastError_ =
  504. SSLSetPeerDomainName(sslCtx_, hostname.c_str(), hostname.length());
  505. return (lastError_ != noErr) ? TLS_ERR_ERROR : TLS_ERR_OK;
  506. }
  507. int AppleTLSSession::closeConnection()
  508. {
  509. if (state_ != st_connected) {
  510. lastError_ = noErr;
  511. return TLS_ERR_ERROR;
  512. }
  513. lastError_ = SSLClose(sslCtx_);
  514. state_ = st_closed;
  515. return lastError_ == noErr ? TLS_ERR_OK : TLS_ERR_ERROR;
  516. }
  517. int AppleTLSSession::checkDirection()
  518. {
  519. // See: https://github.com/aria2/aria2/pull/61#issuecomment-16051793
  520. if (state_ == st_connected) {
  521. // Need to check read first, as SocketCore kinda expects this
  522. size_t buffered;
  523. lastError_ = SSLGetBufferedReadSize(sslCtx_, &buffered);
  524. if (lastError_ == noErr && buffered) {
  525. return TLS_WANT_READ;
  526. }
  527. }
  528. if (writeBuffered_) {
  529. return TLS_WANT_WRITE;
  530. }
  531. // Default to WANT_READ, as SocketCore kinda expects this
  532. return TLS_WANT_READ;
  533. }
  534. ssize_t AppleTLSSession::writeData(const void* data, size_t len)
  535. {
  536. if (state_ != st_connected) {
  537. lastError_ = noErr;
  538. return TLS_ERR_ERROR;
  539. }
  540. size_t processed = 0;
  541. if (writeBuffered_) {
  542. lastError_ = SSLWrite(sslCtx_, nullptr, 0, &processed);
  543. switch (lastError_) {
  544. case noErr:
  545. processed = writeBuffered_;
  546. writeBuffered_ = 0;
  547. return processed;
  548. case errSSLWouldBlock:
  549. return TLS_ERR_WOULDBLOCK;
  550. case errSSLClosedGraceful:
  551. case errSSLClosedNoNotify:
  552. closeConnection();
  553. return TLS_ERR_ERROR;
  554. default:
  555. closeConnection();
  556. state_ = st_error;
  557. return TLS_ERR_ERROR;
  558. }
  559. }
  560. lastError_ = SSLWrite(sslCtx_, data, len, &processed);
  561. switch (lastError_) {
  562. case noErr:
  563. return processed;
  564. case errSSLWouldBlock:
  565. writeBuffered_ = len;
  566. return TLS_ERR_WOULDBLOCK;
  567. case errSSLClosedGraceful:
  568. case errSSLClosedNoNotify:
  569. closeConnection();
  570. return TLS_ERR_ERROR;
  571. default:
  572. closeConnection();
  573. state_ = st_error;
  574. return TLS_ERR_ERROR;
  575. }
  576. }
  577. OSStatus AppleTLSSession::sockWrite(const void* data, size_t* len)
  578. {
  579. size_t remain = *len;
  580. const uint8_t* buffer = static_cast<const uint8_t*>(data);
  581. *len = 0;
  582. while (remain) {
  583. ssize_t w = write(sockfd_, buffer, remain);
  584. if (w <= 0) {
  585. switch (errno) {
  586. case EAGAIN:
  587. return errSSLWouldBlock;
  588. default:
  589. return errSSLClosedAbort;
  590. }
  591. }
  592. remain -= w;
  593. buffer += w;
  594. *len += w;
  595. }
  596. return noErr;
  597. }
  598. ssize_t AppleTLSSession::readData(void* data, size_t len)
  599. {
  600. if (state_ != st_connected) {
  601. lastError_ = noErr;
  602. return TLS_ERR_ERROR;
  603. }
  604. size_t processed = 0;
  605. lastError_ = SSLRead(sslCtx_, data, len, &processed);
  606. switch (lastError_) {
  607. case noErr:
  608. return processed;
  609. case errSSLWouldBlock:
  610. if (processed) {
  611. return processed;
  612. }
  613. return TLS_ERR_WOULDBLOCK;
  614. case errSSLClosedGraceful:
  615. case errSSLClosedNoNotify:
  616. closeConnection();
  617. return TLS_ERR_ERROR;
  618. default:
  619. closeConnection();
  620. state_ = st_error;
  621. return TLS_ERR_ERROR;
  622. }
  623. }
  624. OSStatus AppleTLSSession::sockRead(void* data, size_t* len)
  625. {
  626. size_t remain = *len;
  627. uint8_t* buffer = static_cast<uint8_t*>(data);
  628. *len = 0;
  629. while (remain) {
  630. ssize_t r = read(sockfd_, buffer, remain);
  631. if (r == 0) {
  632. return errSSLClosedGraceful;
  633. }
  634. if (r < 0) {
  635. switch (errno) {
  636. case ENOENT:
  637. return errSSLClosedGraceful;
  638. case ECONNRESET:
  639. return errSSLClosedAbort;
  640. case EAGAIN:
  641. return errSSLWouldBlock;
  642. default:
  643. return errSSLClosedAbort;
  644. }
  645. }
  646. remain -= r;
  647. buffer += r;
  648. *len += r;
  649. }
  650. return noErr;
  651. }
  652. int AppleTLSSession::tlsConnect(const std::string& hostname,
  653. TLSVersion& version, std::string& handshakeErr)
  654. {
  655. if (state_ != st_initialized) {
  656. return TLS_ERR_ERROR;
  657. }
  658. if (!hostname.empty()) {
  659. setSNIHostname(hostname);
  660. }
  661. lastError_ = SSLHandshake(sslCtx_);
  662. switch (lastError_) {
  663. case noErr:
  664. break;
  665. case errSSLWouldBlock:
  666. return TLS_ERR_WOULDBLOCK;
  667. case errSSLServerAuthCompleted:
  668. return tlsConnect(hostname, version, handshakeErr);
  669. default:
  670. handshakeErr = getLastErrorString();
  671. state_ = st_error;
  672. return TLS_ERR_ERROR;
  673. }
  674. state_ = st_connected;
  675. SSLProtocol proto = kSSLProtocolUnknown;
  676. (void)SSLGetNegotiatedProtocolVersion(sslCtx_, &proto);
  677. SSLCipherSuite suite = SSL_NO_SUCH_CIPHERSUITE;
  678. (void)SSLGetNegotiatedCipher(sslCtx_, &suite);
  679. A2_LOG_INFO(fmt("AppleTLS: Connected to %s with %s (%s)", hostname.c_str(),
  680. protoToString(proto), suiteToString(suite).c_str()));
  681. switch (proto) {
  682. case kTLSProtocol11:
  683. version = TLS_PROTO_TLS11;
  684. break;
  685. case kTLSProtocol12:
  686. version = TLS_PROTO_TLS12;
  687. break;
  688. case kTLSProtocol13:
  689. version = TLS_PROTO_TLS13;
  690. break;
  691. default:
  692. version = TLS_PROTO_NONE;
  693. break;
  694. }
  695. return TLS_ERR_OK;
  696. }
  697. int AppleTLSSession::tlsAccept(TLSVersion& version)
  698. {
  699. std::string hostname, err;
  700. return tlsConnect(hostname, version, err);
  701. }
  702. std::string AppleTLSSession::getLastErrorString()
  703. {
  704. switch (lastError_) {
  705. case errSSLProtocol:
  706. return "Protocol error";
  707. case errSSLNegotiation:
  708. return "No common cipher suites";
  709. case errSSLFatalAlert:
  710. return "Received fatal alert";
  711. case errSSLSessionNotFound:
  712. return "Unknown session";
  713. case errSSLClosedGraceful:
  714. return "Closed gracefully";
  715. case errSSLClosedAbort:
  716. return "Connection aborted";
  717. case errSSLXCertChainInvalid:
  718. return "Invalid certificate chain";
  719. case errSSLBadCert:
  720. return "Invalid certificate format";
  721. case errSSLCrypto:
  722. return "Cryptographic error";
  723. case paramErr:
  724. case errSSLInternal:
  725. return "Internal SSL error";
  726. case errSSLUnknownRootCert:
  727. return "Self-signed certificate";
  728. case errSSLNoRootCert:
  729. return "No root certificate";
  730. case errSSLCertExpired:
  731. return "Certificate expired";
  732. case errSSLCertNotYetValid:
  733. return "Certificate not yet valid";
  734. case errSSLClosedNoNotify:
  735. return "Closed without notification";
  736. case errSSLBufferOverflow:
  737. return "Buffer not large enough";
  738. case errSSLBadCipherSuite:
  739. return "Bad cipher suite";
  740. case errSSLPeerUnexpectedMsg:
  741. return "Unexpected peer message";
  742. case errSSLPeerBadRecordMac:
  743. return "Bad MAC";
  744. case errSSLPeerDecryptionFail:
  745. return "Decryption failure";
  746. case errSSLHostNameMismatch:
  747. return "Invalid hostname";
  748. case errSSLConnectionRefused:
  749. return "Connection refused";
  750. default:
  751. return fmt("Unspecified error %ld", (long)lastError_);
  752. }
  753. }
  754. } // namespace aria2