/** * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0. */ #include #include #include #include #include #include #include #define AWS_DEFAULT_TLS_TIMEOUT_MS 10000 #include "./pkcs11_private.h" #include void aws_tls_ctx_options_init_default_client(struct aws_tls_ctx_options *options, struct aws_allocator *allocator) { AWS_ZERO_STRUCT(*options); options->allocator = allocator; options->minimum_tls_version = AWS_IO_TLS_VER_SYS_DEFAULTS; options->cipher_pref = AWS_IO_TLS_CIPHER_PREF_SYSTEM_DEFAULT; options->verify_peer = true; options->max_fragment_size = g_aws_channel_max_fragment_size; } void aws_tls_ctx_options_clean_up(struct aws_tls_ctx_options *options) { aws_byte_buf_clean_up(&options->ca_file); aws_string_destroy(options->ca_path); aws_byte_buf_clean_up(&options->certificate); aws_byte_buf_clean_up_secure(&options->private_key); #ifdef __APPLE__ aws_byte_buf_clean_up_secure(&options->pkcs12); aws_byte_buf_clean_up_secure(&options->pkcs12_password); # if !defined(AWS_OS_IOS) aws_string_destroy(options->keychain_path); # endif #endif aws_string_destroy(options->alpn_list); aws_custom_key_op_handler_release(options->custom_key_op_handler); AWS_ZERO_STRUCT(*options); } int aws_tls_ctx_options_init_client_mtls( struct aws_tls_ctx_options *options, struct aws_allocator *allocator, const struct aws_byte_cursor *cert, const struct aws_byte_cursor *pkey) { #if !defined(AWS_OS_IOS) aws_tls_ctx_options_init_default_client(options, allocator); if (aws_byte_buf_init_copy_from_cursor(&options->certificate, allocator, *cert)) { goto error; } if (aws_sanitize_pem(&options->certificate, allocator)) { AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: Invalid certificate. File must contain PEM encoded data"); goto error; } if (aws_byte_buf_init_copy_from_cursor(&options->private_key, allocator, *pkey)) { goto error; } if (aws_sanitize_pem(&options->private_key, allocator)) { AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: Invalid private key. File must contain PEM encoded data"); goto error; } return AWS_OP_SUCCESS; error: aws_tls_ctx_options_clean_up(options); return AWS_OP_ERR; #else (void)allocator; (void)cert; (void)pkey; AWS_ZERO_STRUCT(*options); AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: This platform does not support PEM certificates"); return aws_raise_error(AWS_ERROR_PLATFORM_NOT_SUPPORTED); #endif } int aws_tls_ctx_options_init_client_mtls_from_path( struct aws_tls_ctx_options *options, struct aws_allocator *allocator, const char *cert_path, const char *pkey_path) { #if !defined(AWS_OS_IOS) aws_tls_ctx_options_init_default_client(options, allocator); if (aws_byte_buf_init_from_file(&options->certificate, allocator, cert_path)) { goto error; } if (aws_sanitize_pem(&options->certificate, allocator)) { AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: Invalid certificate. File must contain PEM encoded data"); goto error; } if (aws_byte_buf_init_from_file(&options->private_key, allocator, pkey_path)) { goto error; } if (aws_sanitize_pem(&options->private_key, allocator)) { AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: Invalid private key. File must contain PEM encoded data"); goto error; } return AWS_OP_SUCCESS; error: aws_tls_ctx_options_clean_up(options); return AWS_OP_ERR; #else (void)allocator; (void)cert_path; (void)pkey_path; AWS_ZERO_STRUCT(*options); AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: This platform does not support PEM certificates"); return aws_raise_error(AWS_ERROR_PLATFORM_NOT_SUPPORTED); #endif } int aws_tls_ctx_options_init_client_mtls_with_custom_key_operations( struct aws_tls_ctx_options *options, struct aws_allocator *allocator, struct aws_custom_key_op_handler *custom, const struct aws_byte_cursor *cert_file_contents) { #if !USE_S2N (void)options; (void)allocator; (void)custom; (void)cert_file_contents; AWS_ZERO_STRUCT(*options); AWS_LOGF_ERROR( AWS_LS_IO_TLS, "static: This platform does not currently support TLS with custom private key operations."); return aws_raise_error(AWS_ERROR_UNIMPLEMENTED); #else aws_tls_ctx_options_init_default_client(options, allocator); /* on_key_operation is required */ AWS_ASSERT(custom != NULL); AWS_ASSERT(custom->vtable != NULL); AWS_ASSERT(custom->vtable->on_key_operation != NULL); /* Hold a reference to the custom key operation handler so it cannot be destroyed */ options->custom_key_op_handler = aws_custom_key_op_handler_acquire((struct aws_custom_key_op_handler *)custom); /* Copy the certificate data from the cursor */ AWS_ASSERT(cert_file_contents != NULL); aws_byte_buf_init_copy_from_cursor(&options->certificate, allocator, *cert_file_contents); /* Make sure the certificate is set and valid */ if (aws_sanitize_pem(&options->certificate, allocator)) { AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: Invalid certificate. File must contain PEM encoded data"); goto error; } return AWS_OP_SUCCESS; error: aws_tls_ctx_options_clean_up(options); return AWS_OP_ERR; #endif /* PLATFORM-SUPPORTS-CUSTOM-KEY-OPERATIONS */ } int aws_tls_ctx_options_init_client_mtls_with_pkcs11( struct aws_tls_ctx_options *options, struct aws_allocator *allocator, const struct aws_tls_ctx_pkcs11_options *pkcs11_options) { #if defined(USE_S2N) struct aws_custom_key_op_handler *pkcs11_handler = aws_pkcs11_tls_op_handler_new( allocator, pkcs11_options->pkcs11_lib, &pkcs11_options->user_pin, &pkcs11_options->token_label, &pkcs11_options->private_key_object_label, pkcs11_options->slot_id); struct aws_byte_buf tmp_cert_buf; AWS_ZERO_STRUCT(tmp_cert_buf); bool success = false; int custom_key_result = AWS_OP_ERR; if (pkcs11_handler == NULL) { goto finish; } if ((pkcs11_options->cert_file_contents.ptr != NULL) && (pkcs11_options->cert_file_path.ptr != NULL)) { AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: Cannot use certificate AND certificate file path, only one can be set"); aws_raise_error(AWS_ERROR_INVALID_ARGUMENT); goto finish; } else if (pkcs11_options->cert_file_contents.ptr != NULL) { custom_key_result = aws_tls_ctx_options_init_client_mtls_with_custom_key_operations( options, allocator, pkcs11_handler, &pkcs11_options->cert_file_contents); success = true; } else { struct aws_string *tmp_string = aws_string_new_from_cursor(allocator, &pkcs11_options->cert_file_path); int op = aws_byte_buf_init_from_file(&tmp_cert_buf, allocator, aws_string_c_str(tmp_string)); aws_string_destroy(tmp_string); if (op != AWS_OP_SUCCESS) { goto finish; } struct aws_byte_cursor tmp_cursor = aws_byte_cursor_from_buf(&tmp_cert_buf); custom_key_result = aws_tls_ctx_options_init_client_mtls_with_custom_key_operations( options, allocator, pkcs11_handler, &tmp_cursor); success = true; } finish: if (pkcs11_handler != NULL) { /** * Calling aws_tls_ctx_options_init_client_mtls_with_custom_key_operations will have this options * hold a reference to the custom key operations, but creating the TLS operations handler using * aws_pkcs11_tls_op_handler_set_certificate_data adds a reference too, so we need to release * this reference so the only thing (currently) holding a reference is the TLS options itself and * not this function. */ aws_custom_key_op_handler_release(pkcs11_handler); } if (success == false) { aws_tls_ctx_options_clean_up(options); } aws_byte_buf_clean_up(&tmp_cert_buf); if (success) { return custom_key_result; } else { return AWS_OP_ERR; } #else /* Platform does not support S2N */ (void)allocator; (void)pkcs11_options; AWS_ZERO_STRUCT(*options); AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: This platform does not currently support TLS with PKCS#11."); return aws_raise_error(AWS_ERROR_PLATFORM_NOT_SUPPORTED); #endif /* PLATFORM-SUPPORTS-PKCS11-TLS */ } int aws_tls_ctx_options_set_keychain_path( struct aws_tls_ctx_options *options, struct aws_byte_cursor *keychain_path_cursor) { #if defined(__APPLE__) && !defined(AWS_OS_IOS) AWS_LOGF_WARN(AWS_LS_IO_TLS, "static: Keychain path is deprecated."); options->keychain_path = aws_string_new_from_cursor(options->allocator, keychain_path_cursor); if (!options->keychain_path) { return AWS_OP_ERR; } return AWS_OP_SUCCESS; #else (void)options; (void)keychain_path_cursor; AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: Keychain path can only be set on MacOS."); return aws_raise_error(AWS_ERROR_PLATFORM_NOT_SUPPORTED); #endif } int aws_tls_ctx_options_init_client_mtls_from_system_path( struct aws_tls_ctx_options *options, struct aws_allocator *allocator, const char *cert_reg_path) { #ifdef _WIN32 aws_tls_ctx_options_init_default_client(options, allocator); options->system_certificate_path = cert_reg_path; return AWS_OP_SUCCESS; #else (void)allocator; (void)cert_reg_path; AWS_ZERO_STRUCT(*options); AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: System certificate path can only be set on Windows."); return aws_raise_error(AWS_ERROR_PLATFORM_NOT_SUPPORTED); #endif } int aws_tls_ctx_options_init_default_server_from_system_path( struct aws_tls_ctx_options *options, struct aws_allocator *allocator, const char *cert_reg_path) { if (aws_tls_ctx_options_init_client_mtls_from_system_path(options, allocator, cert_reg_path)) { return AWS_OP_ERR; } options->verify_peer = false; return AWS_OP_SUCCESS; } int aws_tls_ctx_options_init_client_mtls_pkcs12_from_path( struct aws_tls_ctx_options *options, struct aws_allocator *allocator, const char *pkcs12_path, const struct aws_byte_cursor *pkcs_pwd) { #ifdef __APPLE__ aws_tls_ctx_options_init_default_client(options, allocator); if (aws_byte_buf_init_from_file(&options->pkcs12, allocator, pkcs12_path)) { return AWS_OP_ERR; } if (aws_byte_buf_init_copy_from_cursor(&options->pkcs12_password, allocator, *pkcs_pwd)) { aws_byte_buf_clean_up_secure(&options->pkcs12); return AWS_OP_ERR; } return AWS_OP_SUCCESS; #else (void)allocator; (void)pkcs12_path; (void)pkcs_pwd; AWS_ZERO_STRUCT(*options); AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: This platform does not support PKCS#12 files."); return aws_raise_error(AWS_ERROR_PLATFORM_NOT_SUPPORTED); #endif } int aws_tls_ctx_options_init_client_mtls_pkcs12( struct aws_tls_ctx_options *options, struct aws_allocator *allocator, struct aws_byte_cursor *pkcs12, struct aws_byte_cursor *pkcs_pwd) { #ifdef __APPLE__ aws_tls_ctx_options_init_default_client(options, allocator); if (aws_byte_buf_init_copy_from_cursor(&options->pkcs12, allocator, *pkcs12)) { return AWS_OP_ERR; } if (aws_byte_buf_init_copy_from_cursor(&options->pkcs12_password, allocator, *pkcs_pwd)) { aws_byte_buf_clean_up_secure(&options->pkcs12); return AWS_OP_ERR; } return AWS_OP_SUCCESS; #else (void)allocator; (void)pkcs12; (void)pkcs_pwd; AWS_ZERO_STRUCT(*options); AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: This platform does not support PKCS#12 files."); return aws_raise_error(AWS_ERROR_PLATFORM_NOT_SUPPORTED); #endif } int aws_tls_ctx_options_init_server_pkcs12_from_path( struct aws_tls_ctx_options *options, struct aws_allocator *allocator, const char *pkcs12_path, struct aws_byte_cursor *pkcs_password) { if (aws_tls_ctx_options_init_client_mtls_pkcs12_from_path(options, allocator, pkcs12_path, pkcs_password)) { return AWS_OP_ERR; } options->verify_peer = false; return AWS_OP_SUCCESS; } int aws_tls_ctx_options_init_server_pkcs12( struct aws_tls_ctx_options *options, struct aws_allocator *allocator, struct aws_byte_cursor *pkcs12, struct aws_byte_cursor *pkcs_password) { if (aws_tls_ctx_options_init_client_mtls_pkcs12(options, allocator, pkcs12, pkcs_password)) { return AWS_OP_ERR; } options->verify_peer = false; return AWS_OP_SUCCESS; } int aws_tls_ctx_options_init_default_server_from_path( struct aws_tls_ctx_options *options, struct aws_allocator *allocator, const char *cert_path, const char *pkey_path) { #if !defined(AWS_OS_IOS) if (aws_tls_ctx_options_init_client_mtls_from_path(options, allocator, cert_path, pkey_path)) { return AWS_OP_ERR; } options->verify_peer = false; return AWS_OP_SUCCESS; #else (void)allocator; (void)cert_path; (void)pkey_path; AWS_ZERO_STRUCT(*options); AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: Cannot create a server on this platform."); return aws_raise_error(AWS_ERROR_PLATFORM_NOT_SUPPORTED); #endif } int aws_tls_ctx_options_init_default_server( struct aws_tls_ctx_options *options, struct aws_allocator *allocator, struct aws_byte_cursor *cert, struct aws_byte_cursor *pkey) { #if !defined(AWS_OS_IOS) if (aws_tls_ctx_options_init_client_mtls(options, allocator, cert, pkey)) { return AWS_OP_ERR; } options->verify_peer = false; return AWS_OP_SUCCESS; #else (void)allocator; (void)cert; (void)pkey; AWS_ZERO_STRUCT(*options); AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: Cannot create a server on this platform."); return aws_raise_error(AWS_ERROR_PLATFORM_NOT_SUPPORTED); #endif } int aws_tls_ctx_options_set_alpn_list(struct aws_tls_ctx_options *options, const char *alpn_list) { aws_string_destroy(options->alpn_list); options->alpn_list = aws_string_new_from_c_str(options->allocator, alpn_list); if (!options->alpn_list) { return AWS_OP_ERR; } return AWS_OP_SUCCESS; } void aws_tls_ctx_options_set_verify_peer(struct aws_tls_ctx_options *options, bool verify_peer) { options->verify_peer = verify_peer; } void aws_tls_ctx_options_set_minimum_tls_version( struct aws_tls_ctx_options *options, enum aws_tls_versions minimum_tls_version) { options->minimum_tls_version = minimum_tls_version; } void aws_tls_ctx_options_set_tls_cipher_preference( struct aws_tls_ctx_options *options, enum aws_tls_cipher_pref cipher_pref) { options->cipher_pref = cipher_pref; } int aws_tls_ctx_options_override_default_trust_store_from_path( struct aws_tls_ctx_options *options, const char *ca_path, const char *ca_file) { /* Note: on success these are not cleaned up, their data is "moved" into the options struct */ struct aws_string *ca_path_tmp = NULL; struct aws_byte_buf ca_file_tmp; AWS_ZERO_STRUCT(ca_file_tmp); if (ca_path) { if (options->ca_path) { AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: cannot override trust store multiple times"); aws_raise_error(AWS_ERROR_INVALID_STATE); goto error; } ca_path_tmp = aws_string_new_from_c_str(options->allocator, ca_path); if (!ca_path_tmp) { goto error; } } if (ca_file) { if (aws_tls_options_buf_is_set(&options->ca_file)) { AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: cannot override trust store multiple times"); aws_raise_error(AWS_ERROR_INVALID_STATE); goto error; } if (aws_byte_buf_init_from_file(&ca_file_tmp, options->allocator, ca_file)) { goto error; } if (aws_sanitize_pem(&ca_file_tmp, options->allocator)) { AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: Invalid CA file. File must contain PEM encoded data"); goto error; } } /* Success, set new values. (no need to clean up old values, we checked earlier that they were unallocated) */ if (ca_path) { options->ca_path = ca_path_tmp; } if (ca_file) { options->ca_file = ca_file_tmp; } return AWS_OP_SUCCESS; error: aws_string_destroy_secure(ca_path_tmp); aws_byte_buf_clean_up_secure(&ca_file_tmp); return AWS_OP_ERR; } void aws_tls_ctx_options_set_extension_data(struct aws_tls_ctx_options *options, void *extension_data) { options->ctx_options_extension = extension_data; } int aws_tls_ctx_options_override_default_trust_store( struct aws_tls_ctx_options *options, const struct aws_byte_cursor *ca_file) { if (aws_tls_options_buf_is_set(&options->ca_file)) { AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: cannot override trust store multiple times"); return aws_raise_error(AWS_ERROR_INVALID_STATE); } if (aws_byte_buf_init_copy_from_cursor(&options->ca_file, options->allocator, *ca_file)) { goto error; } if (aws_sanitize_pem(&options->ca_file, options->allocator)) { AWS_LOGF_ERROR(AWS_LS_IO_TLS, "static: Invalid CA file. File must contain PEM encoded data"); goto error; } return AWS_OP_SUCCESS; error: aws_byte_buf_clean_up_secure(&options->ca_file); return AWS_OP_ERR; } void aws_tls_connection_options_init_from_ctx( struct aws_tls_connection_options *conn_options, struct aws_tls_ctx *ctx) { AWS_ZERO_STRUCT(*conn_options); /* the assumption here, is that if it was set in the context, we WANT it to be NULL here unless it's different. * so only set verify peer at this point. */ conn_options->ctx = aws_tls_ctx_acquire(ctx); conn_options->timeout_ms = AWS_DEFAULT_TLS_TIMEOUT_MS; } int aws_tls_connection_options_copy( struct aws_tls_connection_options *to, const struct aws_tls_connection_options *from) { /* clean up the options before copy. */ aws_tls_connection_options_clean_up(to); /* copy everything copyable over, then override the rest with deep copies. */ *to = *from; to->ctx = aws_tls_ctx_acquire(from->ctx); if (from->alpn_list) { to->alpn_list = aws_string_new_from_string(from->alpn_list->allocator, from->alpn_list); if (!to->alpn_list) { return AWS_OP_ERR; } } if (from->server_name) { to->server_name = aws_string_new_from_string(from->server_name->allocator, from->server_name); if (!to->server_name) { aws_string_destroy(to->server_name); return AWS_OP_ERR; } } return AWS_OP_SUCCESS; } void aws_tls_connection_options_clean_up(struct aws_tls_connection_options *connection_options) { aws_tls_ctx_release(connection_options->ctx); if (connection_options->alpn_list) { aws_string_destroy(connection_options->alpn_list); } if (connection_options->server_name) { aws_string_destroy(connection_options->server_name); } AWS_ZERO_STRUCT(*connection_options); } void aws_tls_connection_options_set_callbacks( struct aws_tls_connection_options *conn_options, aws_tls_on_negotiation_result_fn *on_negotiation_result, aws_tls_on_data_read_fn *on_data_read, aws_tls_on_error_fn *on_error, void *user_data) { conn_options->on_negotiation_result = on_negotiation_result; conn_options->on_data_read = on_data_read; conn_options->on_error = on_error; conn_options->user_data = user_data; } int aws_tls_connection_options_set_server_name( struct aws_tls_connection_options *conn_options, struct aws_allocator *allocator, const struct aws_byte_cursor *server_name) { if (conn_options->server_name != NULL) { aws_string_destroy(conn_options->server_name); conn_options->server_name = NULL; } conn_options->server_name = aws_string_new_from_cursor(allocator, server_name); if (!conn_options->server_name) { return AWS_OP_ERR; } return AWS_OP_SUCCESS; } int aws_tls_connection_options_set_alpn_list( struct aws_tls_connection_options *conn_options, struct aws_allocator *allocator, const char *alpn_list) { if (conn_options->alpn_list != NULL) { aws_string_destroy(conn_options->alpn_list); conn_options->alpn_list = NULL; } conn_options->alpn_list = aws_string_new_from_c_str(allocator, alpn_list); if (!conn_options->alpn_list) { return AWS_OP_ERR; } return AWS_OP_SUCCESS; } #ifdef BYO_CRYPTO struct aws_tls_ctx *aws_tls_server_ctx_new(struct aws_allocator *alloc, const struct aws_tls_ctx_options *options) { (void)alloc; (void)options; AWS_FATAL_ASSERT( false && "When using BYO_CRYPTO, user is responsible for creating aws_tls_ctx manually. You cannot call this function."); } struct aws_tls_ctx *aws_tls_client_ctx_new(struct aws_allocator *alloc, const struct aws_tls_ctx_options *options) { (void)alloc; (void)options; AWS_FATAL_ASSERT( false && "When using BYO_CRYPTO, user is responsible for creating aws_tls_ctx manually. You cannot call this function."); } static aws_tls_handler_new_fn *s_client_handler_new = NULL; static aws_tls_client_handler_start_negotiation_fn *s_start_negotiation_fn = NULL; static void *s_client_user_data = NULL; static aws_tls_handler_new_fn *s_server_handler_new = NULL; static void *s_server_user_data = NULL; struct aws_channel_handler *aws_tls_client_handler_new( struct aws_allocator *allocator, struct aws_tls_connection_options *options, struct aws_channel_slot *slot) { AWS_FATAL_ASSERT( s_client_handler_new && "For BYO_CRYPTO, you must call aws_tls_client_handler_new_set_callback() with a non-null value."); return s_client_handler_new(allocator, options, slot, s_client_user_data); } struct aws_channel_handler *aws_tls_server_handler_new( struct aws_allocator *allocator, struct aws_tls_connection_options *options, struct aws_channel_slot *slot) { AWS_FATAL_ASSERT( s_client_handler_new && "For BYO_CRYPTO, you must call aws_tls_server_handler_new_set_callback() with a non-null value."); return s_server_handler_new(allocator, options, slot, s_server_user_data); } void aws_tls_byo_crypto_set_client_setup_options(const struct aws_tls_byo_crypto_setup_options *options) { AWS_FATAL_ASSERT(options); AWS_FATAL_ASSERT(options->new_handler_fn); AWS_FATAL_ASSERT(options->start_negotiation_fn); s_client_handler_new = options->new_handler_fn; s_start_negotiation_fn = options->start_negotiation_fn; s_client_user_data = options->user_data; } void aws_tls_byo_crypto_set_server_setup_options(const struct aws_tls_byo_crypto_setup_options *options) { AWS_FATAL_ASSERT(options); AWS_FATAL_ASSERT(options->new_handler_fn); s_server_handler_new = options->new_handler_fn; s_server_user_data = options->user_data; } int aws_tls_client_handler_start_negotiation(struct aws_channel_handler *handler) { AWS_FATAL_ASSERT( s_start_negotiation_fn && "For BYO_CRYPTO, you must call aws_tls_client_handler_set_start_negotiation_callback() with a non-null value."); return s_start_negotiation_fn(handler, s_client_user_data); } void aws_tls_init_static_state(struct aws_allocator *alloc) { (void)alloc; } void aws_tls_clean_up_static_state(void) {} #endif /* BYO_CRYPTO */ int aws_channel_setup_client_tls( struct aws_channel_slot *right_of_slot, struct aws_tls_connection_options *tls_options) { AWS_FATAL_ASSERT(right_of_slot != NULL); struct aws_channel *channel = right_of_slot->channel; struct aws_allocator *allocator = right_of_slot->alloc; struct aws_channel_slot *tls_slot = aws_channel_slot_new(channel); /* as far as cleanup goes, since this stuff is being added to a channel, the caller will free this memory when they clean up the channel. */ if (!tls_slot) { return AWS_OP_ERR; } struct aws_channel_handler *tls_handler = aws_tls_client_handler_new(allocator, tls_options, tls_slot); if (!tls_handler) { aws_mem_release(allocator, tls_slot); return AWS_OP_ERR; } /* * From here on out, channel shutdown will handle slot/handler cleanup */ aws_channel_slot_insert_right(right_of_slot, tls_slot); AWS_LOGF_TRACE( AWS_LS_IO_CHANNEL, "id=%p: Setting up client TLS with handler %p on slot %p", (void *)channel, (void *)tls_handler, (void *)tls_slot); if (aws_channel_slot_set_handler(tls_slot, tls_handler) != AWS_OP_SUCCESS) { return AWS_OP_ERR; } if (aws_tls_client_handler_start_negotiation(tls_handler) != AWS_OP_SUCCESS) { return AWS_OP_ERR; } return AWS_OP_SUCCESS; } struct aws_tls_ctx *aws_tls_ctx_acquire(struct aws_tls_ctx *ctx) { if (ctx != NULL) { aws_ref_count_acquire(&ctx->ref_count); } return ctx; } void aws_tls_ctx_release(struct aws_tls_ctx *ctx) { if (ctx != NULL) { aws_ref_count_release(&ctx->ref_count); } } const char *aws_tls_hash_algorithm_str(enum aws_tls_hash_algorithm hash) { /* clang-format off */ switch (hash) { case (AWS_TLS_HASH_SHA1): return "SHA1"; case (AWS_TLS_HASH_SHA224): return "SHA224"; case (AWS_TLS_HASH_SHA256): return "SHA256"; case (AWS_TLS_HASH_SHA384): return "SHA384"; case (AWS_TLS_HASH_SHA512): return "SHA512"; default: return ""; } /* clang-format on */ } const char *aws_tls_signature_algorithm_str(enum aws_tls_signature_algorithm signature) { /* clang-format off */ switch (signature) { case (AWS_TLS_SIGNATURE_RSA): return "RSA"; case (AWS_TLS_SIGNATURE_ECDSA): return "ECDSA"; default: return ""; } /* clang-format on */ } const char *aws_tls_key_operation_type_str(enum aws_tls_key_operation_type operation_type) { /* clang-format off */ switch (operation_type) { case (AWS_TLS_KEY_OPERATION_SIGN): return "SIGN"; case (AWS_TLS_KEY_OPERATION_DECRYPT): return "DECRYPT"; default: return ""; } /* clang-format on */ } #if !USE_S2N void aws_tls_key_operation_complete(struct aws_tls_key_operation *operation, struct aws_byte_cursor output) { (void)operation; (void)output; } void aws_tls_key_operation_complete_with_error(struct aws_tls_key_operation *operation, int error_code) { (void)operation; (void)error_code; } struct aws_byte_cursor aws_tls_key_operation_get_input(const struct aws_tls_key_operation *operation) { (void)operation; return aws_byte_cursor_from_array(NULL, 0); } enum aws_tls_key_operation_type aws_tls_key_operation_get_type(const struct aws_tls_key_operation *operation) { (void)operation; return AWS_TLS_KEY_OPERATION_UNKNOWN; } enum aws_tls_signature_algorithm aws_tls_key_operation_get_signature_algorithm( const struct aws_tls_key_operation *operation) { (void)operation; return AWS_TLS_SIGNATURE_UNKNOWN; } enum aws_tls_hash_algorithm aws_tls_key_operation_get_digest_algorithm(const struct aws_tls_key_operation *operation) { (void)operation; return AWS_TLS_HASH_UNKNOWN; } #endif struct aws_custom_key_op_handler *aws_custom_key_op_handler_acquire(struct aws_custom_key_op_handler *key_op_handler) { if (key_op_handler != NULL) { aws_ref_count_acquire(&key_op_handler->ref_count); } return key_op_handler; } struct aws_custom_key_op_handler *aws_custom_key_op_handler_release(struct aws_custom_key_op_handler *key_op_handler) { if (key_op_handler != NULL) { aws_ref_count_release(&key_op_handler->ref_count); } return NULL; } void aws_custom_key_op_handler_perform_operation( struct aws_custom_key_op_handler *key_op_handler, struct aws_tls_key_operation *operation) { key_op_handler->vtable->on_key_operation(key_op_handler, operation); }