summaryrefslogtreecommitdiff
path: root/src/lib/libtls/tls_server.c
diff options
context:
space:
mode:
authorjsing <>2014-10-31 13:46:17 +0000
committerjsing <>2014-10-31 13:46:17 +0000
commitcd85e00508e178758948e7a759609d0f1e7764df (patch)
tree44ea21a19ccf529a3e38fb107d3a2d1330f58d8e /src/lib/libtls/tls_server.c
parente83bdb8edcd9388f13b71372b277fdcce386a9b0 (diff)
downloadopenbsd-cd85e00508e178758948e7a759609d0f1e7764df.tar.gz
openbsd-cd85e00508e178758948e7a759609d0f1e7764df.tar.bz2
openbsd-cd85e00508e178758948e7a759609d0f1e7764df.zip
Rename libressl to libtls to avoid confusion and to make it easier to
distinguish between LibreSSL (the project) and libressl (the library). Discussed with many.
Diffstat (limited to 'src/lib/libtls/tls_server.c')
-rw-r--r--src/lib/libtls/tls_server.c134
1 files changed, 134 insertions, 0 deletions
diff --git a/src/lib/libtls/tls_server.c b/src/lib/libtls/tls_server.c
new file mode 100644
index 0000000000..001f19ded4
--- /dev/null
+++ b/src/lib/libtls/tls_server.c
@@ -0,0 +1,134 @@
1/* $OpenBSD: tls_server.c,v 1.1 2014/10/31 13:46:17 jsing Exp $ */
2/*
3 * Copyright (c) 2014 Joel Sing <jsing@openbsd.org>
4 *
5 * Permission to use, copy, modify, and distribute this software for any
6 * purpose with or without fee is hereby granted, provided that the above
7 * copyright notice and this permission notice appear in all copies.
8 *
9 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
10 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
11 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
12 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
13 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
14 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16 */
17
18#include <openssl/ec.h>
19#include <openssl/ssl.h>
20
21#include <tls.h>
22#include "tls_internal.h"
23
24struct tls *
25tls_server(void)
26{
27 struct tls *ctx;
28
29 if ((ctx = tls_new()) == NULL)
30 return (NULL);
31
32 ctx->flags |= TLS_SERVER;
33
34 return (ctx);
35}
36
37struct tls *
38tls_server_conn(struct tls *ctx)
39{
40 struct tls *conn_ctx;
41
42 if ((conn_ctx = tls_new()) == NULL)
43 return (NULL);
44
45 conn_ctx->flags |= TLS_SERVER_CONN;
46
47 return (conn_ctx);
48}
49
50int
51tls_configure_server(struct tls *ctx)
52{
53 EC_KEY *ecdh_key;
54
55 if ((ctx->ssl_ctx = SSL_CTX_new(SSLv23_server_method())) == NULL) {
56 tls_set_error(ctx, "ssl context failure");
57 goto err;
58 }
59
60 if (tls_configure_ssl(ctx) != 0)
61 goto err;
62 if (tls_configure_keypair(ctx) != 0)
63 goto err;
64
65 if (ctx->config->ecdhcurve == -1) {
66 SSL_CTX_set_ecdh_auto(ctx->ssl_ctx, 1);
67 } else if (ctx->config->ecdhcurve != NID_undef) {
68 if ((ecdh_key = EC_KEY_new_by_curve_name(
69 ctx->config->ecdhcurve)) == NULL) {
70 tls_set_error(ctx, "failed to set ECDH curve");
71 goto err;
72 }
73 SSL_CTX_set_options(ctx->ssl_ctx, SSL_OP_SINGLE_ECDH_USE);
74 SSL_CTX_set_tmp_ecdh(ctx->ssl_ctx, ecdh_key);
75 EC_KEY_free(ecdh_key);
76 }
77
78 return (0);
79
80err:
81 return (-1);
82}
83
84int
85tls_accept_socket(struct tls *ctx, struct tls **cctx, int socket)
86{
87 struct tls *conn_ctx = *cctx;
88 int ret, ssl_err;
89
90 if ((ctx->flags & TLS_SERVER) == 0) {
91 tls_set_error(ctx, "not a server context");
92 goto err;
93 }
94
95 if (conn_ctx == NULL) {
96 if ((conn_ctx = tls_server_conn(ctx)) == NULL) {
97 tls_set_error(ctx, "connection context failure");
98 goto err;
99 }
100 *cctx = conn_ctx;
101
102 conn_ctx->socket = socket;
103
104 if ((conn_ctx->ssl_conn = SSL_new(ctx->ssl_ctx)) == NULL) {
105 tls_set_error(ctx, "ssl failure");
106 goto err;
107 }
108
109 if (SSL_set_fd(conn_ctx->ssl_conn, socket) != 1) {
110 tls_set_error(ctx, "ssl set fd failure");
111 goto err;
112 }
113 SSL_set_app_data(conn_ctx->ssl_conn, conn_ctx);
114 }
115
116 if ((ret = SSL_accept(conn_ctx->ssl_conn)) != 1) {
117 ssl_err = SSL_get_error(conn_ctx->ssl_conn, ret);
118 switch (ssl_err) {
119 case SSL_ERROR_WANT_READ:
120 return (TLS_READ_AGAIN);
121 case SSL_ERROR_WANT_WRITE:
122 return (TLS_WRITE_AGAIN);
123 default:
124 tls_set_error(ctx, "ssl accept failure (%i)",
125 ssl_err);
126 goto err;
127 }
128 }
129
130 return (0);
131
132err:
133 return (-1);
134}