mirror of
https://github.com/espressif/esp-idf.git
synced 2024-10-05 20:47:46 -04:00
[openssl] Add support for defining ALPN protocols
This commit is contained in:
parent
7c9b24b407
commit
3420baa01b
@ -81,6 +81,9 @@ typedef struct x509_method_st X509_METHOD;
|
||||
struct pkey_method_st;
|
||||
typedef struct pkey_method_st PKEY_METHOD;
|
||||
|
||||
struct ssl_alpn_st;
|
||||
typedef struct ssl_alpn_st SSL_ALPN;
|
||||
|
||||
struct stack_st {
|
||||
|
||||
char **data;
|
||||
@ -144,6 +147,16 @@ struct X509_VERIFY_PARAM_st {
|
||||
|
||||
};
|
||||
|
||||
typedef enum { ALPN_INIT, ALPN_ENABLE, ALPN_DISABLE, ALPN_ERROR } ALPN_STATUS;
|
||||
struct ssl_alpn_st {
|
||||
ALPN_STATUS alpn_status;
|
||||
/* This is dynamically allocated */
|
||||
char *alpn_string;
|
||||
/* This only points to the members in the string */
|
||||
#define ALPN_LIST_MAX 10
|
||||
const char *alpn_list[ALPN_LIST_MAX];
|
||||
};
|
||||
|
||||
struct ssl_ctx_st
|
||||
{
|
||||
int version;
|
||||
@ -152,9 +165,7 @@ struct ssl_ctx_st
|
||||
|
||||
unsigned long options;
|
||||
|
||||
#if 0
|
||||
struct alpn_protocols alpn_protocol;
|
||||
#endif
|
||||
SSL_ALPN ssl_alpn;
|
||||
|
||||
const SSL_METHOD *method;
|
||||
|
||||
@ -277,6 +288,7 @@ struct pkey_method_st {
|
||||
int (*pkey_load)(EVP_PKEY *pkey, const unsigned char *buf, int len);
|
||||
};
|
||||
|
||||
|
||||
typedef int (*next_proto_cb)(SSL *ssl, unsigned char **out,
|
||||
unsigned char *outlen, const unsigned char *in,
|
||||
unsigned int inlen, void *arg);
|
||||
|
@ -224,6 +224,10 @@ void SSL_CTX_free(SSL_CTX* ctx)
|
||||
|
||||
X509_free(ctx->client_CA);
|
||||
|
||||
if (ctx->ssl_alpn.alpn_string) {
|
||||
ssl_mem_free((void *)ctx->ssl_alpn.alpn_string);
|
||||
}
|
||||
|
||||
ssl_mem_free(ctx);
|
||||
}
|
||||
|
||||
@ -1554,3 +1558,38 @@ void SSL_set_verify(SSL *ssl, int mode, int (*verify_callback)(int, X509_STORE_C
|
||||
ssl->verify_mode = mode;
|
||||
ssl->verify_callback = verify_callback;
|
||||
}
|
||||
|
||||
/**
|
||||
* @brief set the ALPN protocols in the preferred order. SSL APIs require the
|
||||
* protocols in a <length><value><length2><value2> format. mbedtls doesn't need
|
||||
* that though. We sanitize that here itself. So convert from:
|
||||
* "\x02h2\x06spdy/1" to { {"h2"}, {"spdy/1}, {NULL}}
|
||||
*/
|
||||
int SSL_CTX_set_alpn_protos(SSL_CTX *ctx, const unsigned char *protos, unsigned protos_len)
|
||||
{
|
||||
ctx->ssl_alpn.alpn_string = ssl_mem_zalloc(protos_len + 1);
|
||||
if (! ctx->ssl_alpn.alpn_string) {
|
||||
return 1;
|
||||
}
|
||||
ctx->ssl_alpn.alpn_status = ALPN_ENABLE;
|
||||
memcpy(ctx->ssl_alpn.alpn_string, protos, protos_len);
|
||||
|
||||
char *ptr = ctx->ssl_alpn.alpn_string;
|
||||
int i;
|
||||
/* Only running to 1 less than the actual size */
|
||||
for (i = 0; i < ALPN_LIST_MAX - 1; i++) {
|
||||
char len = *ptr;
|
||||
*ptr = '\0'; // Overwrite the length to act as previous element's string terminator
|
||||
ptr++;
|
||||
protos_len--;
|
||||
ctx->ssl_alpn.alpn_list[i] = ptr;
|
||||
ptr += len;
|
||||
protos_len -= len;
|
||||
if (! protos_len) {
|
||||
i++;
|
||||
break;
|
||||
}
|
||||
}
|
||||
ctx->ssl_alpn.alpn_list[i] = NULL;
|
||||
return 0;
|
||||
}
|
||||
|
@ -153,6 +153,9 @@ int ssl_pm_new(SSL *ssl)
|
||||
mbedtls_ssl_conf_min_version(&ssl_pm->conf, MBEDTLS_SSL_MAJOR_VERSION_3, MBEDTLS_SSL_MINOR_VERSION_0);
|
||||
}
|
||||
|
||||
if (ssl->ctx->ssl_alpn.alpn_status == ALPN_ENABLE) {
|
||||
mbedtls_ssl_conf_alpn_protocols( &ssl_pm->conf, ssl->ctx->ssl_alpn.alpn_list );
|
||||
}
|
||||
mbedtls_ssl_conf_rng(&ssl_pm->conf, mbedtls_ctr_drbg_random, &ssl_pm->ctr_drbg);
|
||||
|
||||
#ifdef CONFIG_OPENSSL_LOWLEVEL_DEBUG
|
||||
|
Loading…
Reference in New Issue
Block a user