xref: /aosp_15_r20/external/boringssl/src/tool/server.cc (revision 8fb009dc861624b67b6cdb62ea21f0f22d0c584b)
1*8fb009dcSAndroid Build Coastguard Worker /* Copyright (c) 2014, Google Inc.
2*8fb009dcSAndroid Build Coastguard Worker  *
3*8fb009dcSAndroid Build Coastguard Worker  * Permission to use, copy, modify, and/or distribute this software for any
4*8fb009dcSAndroid Build Coastguard Worker  * purpose with or without fee is hereby granted, provided that the above
5*8fb009dcSAndroid Build Coastguard Worker  * copyright notice and this permission notice appear in all copies.
6*8fb009dcSAndroid Build Coastguard Worker  *
7*8fb009dcSAndroid Build Coastguard Worker  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
8*8fb009dcSAndroid Build Coastguard Worker  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
9*8fb009dcSAndroid Build Coastguard Worker  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
10*8fb009dcSAndroid Build Coastguard Worker  * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
11*8fb009dcSAndroid Build Coastguard Worker  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
12*8fb009dcSAndroid Build Coastguard Worker  * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
13*8fb009dcSAndroid Build Coastguard Worker  * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
14*8fb009dcSAndroid Build Coastguard Worker 
15*8fb009dcSAndroid Build Coastguard Worker #include <openssl/base.h>
16*8fb009dcSAndroid Build Coastguard Worker 
17*8fb009dcSAndroid Build Coastguard Worker #include <memory>
18*8fb009dcSAndroid Build Coastguard Worker 
19*8fb009dcSAndroid Build Coastguard Worker #include <openssl/err.h>
20*8fb009dcSAndroid Build Coastguard Worker #include <openssl/hpke.h>
21*8fb009dcSAndroid Build Coastguard Worker #include <openssl/rand.h>
22*8fb009dcSAndroid Build Coastguard Worker #include <openssl/ssl.h>
23*8fb009dcSAndroid Build Coastguard Worker 
24*8fb009dcSAndroid Build Coastguard Worker #include "internal.h"
25*8fb009dcSAndroid Build Coastguard Worker #include "transport_common.h"
26*8fb009dcSAndroid Build Coastguard Worker 
27*8fb009dcSAndroid Build Coastguard Worker 
28*8fb009dcSAndroid Build Coastguard Worker static const struct argument kArguments[] = {
29*8fb009dcSAndroid Build Coastguard Worker     {
30*8fb009dcSAndroid Build Coastguard Worker         "-accept", kRequiredArgument,
31*8fb009dcSAndroid Build Coastguard Worker         "The port of the server to bind on; eg 45102",
32*8fb009dcSAndroid Build Coastguard Worker     },
33*8fb009dcSAndroid Build Coastguard Worker     {
34*8fb009dcSAndroid Build Coastguard Worker         "-cipher", kOptionalArgument,
35*8fb009dcSAndroid Build Coastguard Worker         "An OpenSSL-style cipher suite string that configures the offered "
36*8fb009dcSAndroid Build Coastguard Worker         "ciphers",
37*8fb009dcSAndroid Build Coastguard Worker     },
38*8fb009dcSAndroid Build Coastguard Worker     {
39*8fb009dcSAndroid Build Coastguard Worker         "-curves", kOptionalArgument,
40*8fb009dcSAndroid Build Coastguard Worker         "An OpenSSL-style ECDH curves list that configures the offered curves",
41*8fb009dcSAndroid Build Coastguard Worker     },
42*8fb009dcSAndroid Build Coastguard Worker     {
43*8fb009dcSAndroid Build Coastguard Worker         "-max-version", kOptionalArgument,
44*8fb009dcSAndroid Build Coastguard Worker         "The maximum acceptable protocol version",
45*8fb009dcSAndroid Build Coastguard Worker     },
46*8fb009dcSAndroid Build Coastguard Worker     {
47*8fb009dcSAndroid Build Coastguard Worker         "-min-version", kOptionalArgument,
48*8fb009dcSAndroid Build Coastguard Worker         "The minimum acceptable protocol version",
49*8fb009dcSAndroid Build Coastguard Worker     },
50*8fb009dcSAndroid Build Coastguard Worker     {
51*8fb009dcSAndroid Build Coastguard Worker         "-key", kOptionalArgument,
52*8fb009dcSAndroid Build Coastguard Worker         "PEM-encoded file containing the private key. A self-signed "
53*8fb009dcSAndroid Build Coastguard Worker         "certificate is generated at runtime if this argument is not provided.",
54*8fb009dcSAndroid Build Coastguard Worker     },
55*8fb009dcSAndroid Build Coastguard Worker     {
56*8fb009dcSAndroid Build Coastguard Worker         "-cert", kOptionalArgument,
57*8fb009dcSAndroid Build Coastguard Worker         "PEM-encoded file containing the leaf certificate and optional "
58*8fb009dcSAndroid Build Coastguard Worker         "certificate chain. This is taken from the -key argument if this "
59*8fb009dcSAndroid Build Coastguard Worker         "argument is not provided.",
60*8fb009dcSAndroid Build Coastguard Worker     },
61*8fb009dcSAndroid Build Coastguard Worker     {
62*8fb009dcSAndroid Build Coastguard Worker         "-ocsp-response", kOptionalArgument, "OCSP response file to send",
63*8fb009dcSAndroid Build Coastguard Worker     },
64*8fb009dcSAndroid Build Coastguard Worker     {
65*8fb009dcSAndroid Build Coastguard Worker         "-ech-key",
66*8fb009dcSAndroid Build Coastguard Worker         kOptionalArgument,
67*8fb009dcSAndroid Build Coastguard Worker         "File containing the private key corresponding to the ECHConfig.",
68*8fb009dcSAndroid Build Coastguard Worker     },
69*8fb009dcSAndroid Build Coastguard Worker     {
70*8fb009dcSAndroid Build Coastguard Worker         "-ech-config",
71*8fb009dcSAndroid Build Coastguard Worker         kOptionalArgument,
72*8fb009dcSAndroid Build Coastguard Worker         "File containing one ECHConfig.",
73*8fb009dcSAndroid Build Coastguard Worker     },
74*8fb009dcSAndroid Build Coastguard Worker     {
75*8fb009dcSAndroid Build Coastguard Worker         "-loop", kBooleanArgument,
76*8fb009dcSAndroid Build Coastguard Worker         "The server will continue accepting new sequential connections.",
77*8fb009dcSAndroid Build Coastguard Worker     },
78*8fb009dcSAndroid Build Coastguard Worker     {
79*8fb009dcSAndroid Build Coastguard Worker         "-early-data", kBooleanArgument, "Allow early data",
80*8fb009dcSAndroid Build Coastguard Worker     },
81*8fb009dcSAndroid Build Coastguard Worker     {
82*8fb009dcSAndroid Build Coastguard Worker         "-www", kBooleanArgument,
83*8fb009dcSAndroid Build Coastguard Worker         "The server will print connection information in response to a "
84*8fb009dcSAndroid Build Coastguard Worker         "HTTP GET request.",
85*8fb009dcSAndroid Build Coastguard Worker     },
86*8fb009dcSAndroid Build Coastguard Worker     {
87*8fb009dcSAndroid Build Coastguard Worker         "-debug", kBooleanArgument,
88*8fb009dcSAndroid Build Coastguard Worker         "Print debug information about the handshake",
89*8fb009dcSAndroid Build Coastguard Worker     },
90*8fb009dcSAndroid Build Coastguard Worker     {
91*8fb009dcSAndroid Build Coastguard Worker         "-require-any-client-cert", kBooleanArgument,
92*8fb009dcSAndroid Build Coastguard Worker         "The server will require a client certificate.",
93*8fb009dcSAndroid Build Coastguard Worker     },
94*8fb009dcSAndroid Build Coastguard Worker     {
95*8fb009dcSAndroid Build Coastguard Worker         "-jdk11-workaround", kBooleanArgument,
96*8fb009dcSAndroid Build Coastguard Worker         "Enable the JDK 11 workaround",
97*8fb009dcSAndroid Build Coastguard Worker     },
98*8fb009dcSAndroid Build Coastguard Worker     {
99*8fb009dcSAndroid Build Coastguard Worker         "", kOptionalArgument, "",
100*8fb009dcSAndroid Build Coastguard Worker     },
101*8fb009dcSAndroid Build Coastguard Worker };
102*8fb009dcSAndroid Build Coastguard Worker 
LoadOCSPResponse(SSL_CTX * ctx,const char * filename)103*8fb009dcSAndroid Build Coastguard Worker static bool LoadOCSPResponse(SSL_CTX *ctx, const char *filename) {
104*8fb009dcSAndroid Build Coastguard Worker   ScopedFILE f(fopen(filename, "rb"));
105*8fb009dcSAndroid Build Coastguard Worker   std::vector<uint8_t> data;
106*8fb009dcSAndroid Build Coastguard Worker   if (f == nullptr ||
107*8fb009dcSAndroid Build Coastguard Worker       !ReadAll(&data, f.get())) {
108*8fb009dcSAndroid Build Coastguard Worker     fprintf(stderr, "Error reading %s.\n", filename);
109*8fb009dcSAndroid Build Coastguard Worker     return false;
110*8fb009dcSAndroid Build Coastguard Worker   }
111*8fb009dcSAndroid Build Coastguard Worker 
112*8fb009dcSAndroid Build Coastguard Worker   if (!SSL_CTX_set_ocsp_response(ctx, data.data(), data.size())) {
113*8fb009dcSAndroid Build Coastguard Worker     return false;
114*8fb009dcSAndroid Build Coastguard Worker   }
115*8fb009dcSAndroid Build Coastguard Worker 
116*8fb009dcSAndroid Build Coastguard Worker   return true;
117*8fb009dcSAndroid Build Coastguard Worker }
118*8fb009dcSAndroid Build Coastguard Worker 
MakeKeyPairForSelfSignedCert()119*8fb009dcSAndroid Build Coastguard Worker static bssl::UniquePtr<EVP_PKEY> MakeKeyPairForSelfSignedCert() {
120*8fb009dcSAndroid Build Coastguard Worker   bssl::UniquePtr<EC_KEY> ec_key(EC_KEY_new_by_curve_name(NID_X9_62_prime256v1));
121*8fb009dcSAndroid Build Coastguard Worker   if (!ec_key || !EC_KEY_generate_key(ec_key.get())) {
122*8fb009dcSAndroid Build Coastguard Worker     fprintf(stderr, "Failed to generate key pair.\n");
123*8fb009dcSAndroid Build Coastguard Worker     return nullptr;
124*8fb009dcSAndroid Build Coastguard Worker   }
125*8fb009dcSAndroid Build Coastguard Worker   bssl::UniquePtr<EVP_PKEY> evp_pkey(EVP_PKEY_new());
126*8fb009dcSAndroid Build Coastguard Worker   if (!evp_pkey || !EVP_PKEY_assign_EC_KEY(evp_pkey.get(), ec_key.release())) {
127*8fb009dcSAndroid Build Coastguard Worker     fprintf(stderr, "Failed to assign key pair.\n");
128*8fb009dcSAndroid Build Coastguard Worker     return nullptr;
129*8fb009dcSAndroid Build Coastguard Worker   }
130*8fb009dcSAndroid Build Coastguard Worker   return evp_pkey;
131*8fb009dcSAndroid Build Coastguard Worker }
132*8fb009dcSAndroid Build Coastguard Worker 
MakeSelfSignedCert(EVP_PKEY * evp_pkey,const int valid_days)133*8fb009dcSAndroid Build Coastguard Worker static bssl::UniquePtr<X509> MakeSelfSignedCert(EVP_PKEY *evp_pkey,
134*8fb009dcSAndroid Build Coastguard Worker                                                 const int valid_days) {
135*8fb009dcSAndroid Build Coastguard Worker   uint64_t serial;
136*8fb009dcSAndroid Build Coastguard Worker   bssl::UniquePtr<X509> x509(X509_new());
137*8fb009dcSAndroid Build Coastguard Worker   if (!x509 ||  //
138*8fb009dcSAndroid Build Coastguard Worker       !X509_set_version(x509.get(), X509_VERSION_3) ||
139*8fb009dcSAndroid Build Coastguard Worker       !RAND_bytes(reinterpret_cast<uint8_t *>(&serial), sizeof(serial)) ||
140*8fb009dcSAndroid Build Coastguard Worker       !ASN1_INTEGER_set_uint64(X509_get_serialNumber(x509.get()), serial) ||
141*8fb009dcSAndroid Build Coastguard Worker       !X509_gmtime_adj(X509_get_notBefore(x509.get()), 0) ||
142*8fb009dcSAndroid Build Coastguard Worker       !X509_gmtime_adj(X509_get_notAfter(x509.get()),
143*8fb009dcSAndroid Build Coastguard Worker                        60 * 60 * 24 * valid_days)) {
144*8fb009dcSAndroid Build Coastguard Worker     return nullptr;
145*8fb009dcSAndroid Build Coastguard Worker   }
146*8fb009dcSAndroid Build Coastguard Worker 
147*8fb009dcSAndroid Build Coastguard Worker   X509_NAME *subject = X509_get_subject_name(x509.get());
148*8fb009dcSAndroid Build Coastguard Worker   if (!X509_NAME_add_entry_by_txt(subject, "C", MBSTRING_ASC,
149*8fb009dcSAndroid Build Coastguard Worker                                   reinterpret_cast<const uint8_t *>("US"), -1,
150*8fb009dcSAndroid Build Coastguard Worker                                   -1, 0) ||
151*8fb009dcSAndroid Build Coastguard Worker       !X509_NAME_add_entry_by_txt(
152*8fb009dcSAndroid Build Coastguard Worker           subject, "O", MBSTRING_ASC,
153*8fb009dcSAndroid Build Coastguard Worker           reinterpret_cast<const uint8_t *>("BoringSSL"), -1, -1, 0) ||
154*8fb009dcSAndroid Build Coastguard Worker       !X509_set_issuer_name(x509.get(), subject)) {
155*8fb009dcSAndroid Build Coastguard Worker     return nullptr;
156*8fb009dcSAndroid Build Coastguard Worker   }
157*8fb009dcSAndroid Build Coastguard Worker 
158*8fb009dcSAndroid Build Coastguard Worker   // macOS requires an explicit EKU extension.
159*8fb009dcSAndroid Build Coastguard Worker   bssl::UniquePtr<STACK_OF(ASN1_OBJECT)> ekus(sk_ASN1_OBJECT_new_null());
160*8fb009dcSAndroid Build Coastguard Worker   if (!ekus ||
161*8fb009dcSAndroid Build Coastguard Worker       !sk_ASN1_OBJECT_push(ekus.get(), OBJ_nid2obj(NID_server_auth)) ||
162*8fb009dcSAndroid Build Coastguard Worker       !X509_add1_ext_i2d(x509.get(), NID_ext_key_usage, ekus.get(), /*crit=*/1,
163*8fb009dcSAndroid Build Coastguard Worker                          /*flags=*/0)) {
164*8fb009dcSAndroid Build Coastguard Worker     return nullptr;
165*8fb009dcSAndroid Build Coastguard Worker   }
166*8fb009dcSAndroid Build Coastguard Worker 
167*8fb009dcSAndroid Build Coastguard Worker   if (!X509_set_pubkey(x509.get(), evp_pkey)) {
168*8fb009dcSAndroid Build Coastguard Worker     fprintf(stderr, "Failed to set public key.\n");
169*8fb009dcSAndroid Build Coastguard Worker     return nullptr;
170*8fb009dcSAndroid Build Coastguard Worker   }
171*8fb009dcSAndroid Build Coastguard Worker   if (!X509_sign(x509.get(), evp_pkey, EVP_sha256())) {
172*8fb009dcSAndroid Build Coastguard Worker     fprintf(stderr, "Failed to sign certificate.\n");
173*8fb009dcSAndroid Build Coastguard Worker     return nullptr;
174*8fb009dcSAndroid Build Coastguard Worker   }
175*8fb009dcSAndroid Build Coastguard Worker   return x509;
176*8fb009dcSAndroid Build Coastguard Worker }
177*8fb009dcSAndroid Build Coastguard Worker 
InfoCallback(const SSL * ssl,int type,int value)178*8fb009dcSAndroid Build Coastguard Worker static void InfoCallback(const SSL *ssl, int type, int value) {
179*8fb009dcSAndroid Build Coastguard Worker   switch (type) {
180*8fb009dcSAndroid Build Coastguard Worker     case SSL_CB_HANDSHAKE_START:
181*8fb009dcSAndroid Build Coastguard Worker       fprintf(stderr, "Handshake started.\n");
182*8fb009dcSAndroid Build Coastguard Worker       break;
183*8fb009dcSAndroid Build Coastguard Worker     case SSL_CB_HANDSHAKE_DONE:
184*8fb009dcSAndroid Build Coastguard Worker       fprintf(stderr, "Handshake done.\n");
185*8fb009dcSAndroid Build Coastguard Worker       break;
186*8fb009dcSAndroid Build Coastguard Worker     case SSL_CB_ACCEPT_LOOP:
187*8fb009dcSAndroid Build Coastguard Worker       fprintf(stderr, "Handshake progress: %s\n", SSL_state_string_long(ssl));
188*8fb009dcSAndroid Build Coastguard Worker       break;
189*8fb009dcSAndroid Build Coastguard Worker   }
190*8fb009dcSAndroid Build Coastguard Worker }
191*8fb009dcSAndroid Build Coastguard Worker 
192*8fb009dcSAndroid Build Coastguard Worker static FILE *g_keylog_file = nullptr;
193*8fb009dcSAndroid Build Coastguard Worker 
KeyLogCallback(const SSL * ssl,const char * line)194*8fb009dcSAndroid Build Coastguard Worker static void KeyLogCallback(const SSL *ssl, const char *line) {
195*8fb009dcSAndroid Build Coastguard Worker   fprintf(g_keylog_file, "%s\n", line);
196*8fb009dcSAndroid Build Coastguard Worker   fflush(g_keylog_file);
197*8fb009dcSAndroid Build Coastguard Worker }
198*8fb009dcSAndroid Build Coastguard Worker 
HandleWWW(SSL * ssl)199*8fb009dcSAndroid Build Coastguard Worker static bool HandleWWW(SSL *ssl) {
200*8fb009dcSAndroid Build Coastguard Worker   bssl::UniquePtr<BIO> bio(BIO_new(BIO_s_mem()));
201*8fb009dcSAndroid Build Coastguard Worker   if (!bio) {
202*8fb009dcSAndroid Build Coastguard Worker     fprintf(stderr, "Cannot create BIO for response\n");
203*8fb009dcSAndroid Build Coastguard Worker     return false;
204*8fb009dcSAndroid Build Coastguard Worker   }
205*8fb009dcSAndroid Build Coastguard Worker 
206*8fb009dcSAndroid Build Coastguard Worker   BIO_puts(bio.get(), "HTTP/1.0 200 OK\r\nContent-Type: text/plain\r\n\r\n");
207*8fb009dcSAndroid Build Coastguard Worker   PrintConnectionInfo(bio.get(), ssl);
208*8fb009dcSAndroid Build Coastguard Worker 
209*8fb009dcSAndroid Build Coastguard Worker   char request[4];
210*8fb009dcSAndroid Build Coastguard Worker   size_t request_len = 0;
211*8fb009dcSAndroid Build Coastguard Worker   while (request_len < sizeof(request)) {
212*8fb009dcSAndroid Build Coastguard Worker     int ssl_ret =
213*8fb009dcSAndroid Build Coastguard Worker         SSL_read(ssl, request + request_len, sizeof(request) - request_len);
214*8fb009dcSAndroid Build Coastguard Worker     if (ssl_ret <= 0) {
215*8fb009dcSAndroid Build Coastguard Worker       int ssl_err = SSL_get_error(ssl, ssl_ret);
216*8fb009dcSAndroid Build Coastguard Worker       PrintSSLError(stderr, "Error while reading", ssl_err, ssl_ret);
217*8fb009dcSAndroid Build Coastguard Worker       return false;
218*8fb009dcSAndroid Build Coastguard Worker     }
219*8fb009dcSAndroid Build Coastguard Worker     request_len += static_cast<size_t>(ssl_ret);
220*8fb009dcSAndroid Build Coastguard Worker   }
221*8fb009dcSAndroid Build Coastguard Worker 
222*8fb009dcSAndroid Build Coastguard Worker   // Assume simple HTTP request, print status.
223*8fb009dcSAndroid Build Coastguard Worker   if (memcmp(request, "GET ", 4) == 0) {
224*8fb009dcSAndroid Build Coastguard Worker     const uint8_t *response;
225*8fb009dcSAndroid Build Coastguard Worker     size_t response_len;
226*8fb009dcSAndroid Build Coastguard Worker     if (BIO_mem_contents(bio.get(), &response, &response_len)) {
227*8fb009dcSAndroid Build Coastguard Worker       SSL_write(ssl, response, response_len);
228*8fb009dcSAndroid Build Coastguard Worker     }
229*8fb009dcSAndroid Build Coastguard Worker   }
230*8fb009dcSAndroid Build Coastguard Worker   return true;
231*8fb009dcSAndroid Build Coastguard Worker }
232*8fb009dcSAndroid Build Coastguard Worker 
Server(const std::vector<std::string> & args)233*8fb009dcSAndroid Build Coastguard Worker bool Server(const std::vector<std::string> &args) {
234*8fb009dcSAndroid Build Coastguard Worker   if (!InitSocketLibrary()) {
235*8fb009dcSAndroid Build Coastguard Worker     return false;
236*8fb009dcSAndroid Build Coastguard Worker   }
237*8fb009dcSAndroid Build Coastguard Worker 
238*8fb009dcSAndroid Build Coastguard Worker   std::map<std::string, std::string> args_map;
239*8fb009dcSAndroid Build Coastguard Worker 
240*8fb009dcSAndroid Build Coastguard Worker   if (!ParseKeyValueArguments(&args_map, args, kArguments)) {
241*8fb009dcSAndroid Build Coastguard Worker     PrintUsage(kArguments);
242*8fb009dcSAndroid Build Coastguard Worker     return false;
243*8fb009dcSAndroid Build Coastguard Worker   }
244*8fb009dcSAndroid Build Coastguard Worker 
245*8fb009dcSAndroid Build Coastguard Worker   bssl::UniquePtr<SSL_CTX> ctx(SSL_CTX_new(TLS_method()));
246*8fb009dcSAndroid Build Coastguard Worker 
247*8fb009dcSAndroid Build Coastguard Worker   const char *keylog_file = getenv("SSLKEYLOGFILE");
248*8fb009dcSAndroid Build Coastguard Worker   if (keylog_file) {
249*8fb009dcSAndroid Build Coastguard Worker     g_keylog_file = fopen(keylog_file, "a");
250*8fb009dcSAndroid Build Coastguard Worker     if (g_keylog_file == nullptr) {
251*8fb009dcSAndroid Build Coastguard Worker       perror("fopen");
252*8fb009dcSAndroid Build Coastguard Worker       return false;
253*8fb009dcSAndroid Build Coastguard Worker     }
254*8fb009dcSAndroid Build Coastguard Worker     SSL_CTX_set_keylog_callback(ctx.get(), KeyLogCallback);
255*8fb009dcSAndroid Build Coastguard Worker   }
256*8fb009dcSAndroid Build Coastguard Worker 
257*8fb009dcSAndroid Build Coastguard Worker   // Server authentication is required.
258*8fb009dcSAndroid Build Coastguard Worker   if (args_map.count("-key") != 0) {
259*8fb009dcSAndroid Build Coastguard Worker     std::string key = args_map["-key"];
260*8fb009dcSAndroid Build Coastguard Worker     if (!SSL_CTX_use_PrivateKey_file(ctx.get(), key.c_str(),
261*8fb009dcSAndroid Build Coastguard Worker                                      SSL_FILETYPE_PEM)) {
262*8fb009dcSAndroid Build Coastguard Worker       fprintf(stderr, "Failed to load private key: %s\n", key.c_str());
263*8fb009dcSAndroid Build Coastguard Worker       return false;
264*8fb009dcSAndroid Build Coastguard Worker     }
265*8fb009dcSAndroid Build Coastguard Worker     const std::string &cert =
266*8fb009dcSAndroid Build Coastguard Worker         args_map.count("-cert") != 0 ? args_map["-cert"] : key;
267*8fb009dcSAndroid Build Coastguard Worker     if (!SSL_CTX_use_certificate_chain_file(ctx.get(), cert.c_str())) {
268*8fb009dcSAndroid Build Coastguard Worker       fprintf(stderr, "Failed to load cert chain: %s\n", cert.c_str());
269*8fb009dcSAndroid Build Coastguard Worker       return false;
270*8fb009dcSAndroid Build Coastguard Worker     }
271*8fb009dcSAndroid Build Coastguard Worker   } else {
272*8fb009dcSAndroid Build Coastguard Worker     bssl::UniquePtr<EVP_PKEY> evp_pkey = MakeKeyPairForSelfSignedCert();
273*8fb009dcSAndroid Build Coastguard Worker     if (!evp_pkey) {
274*8fb009dcSAndroid Build Coastguard Worker       return false;
275*8fb009dcSAndroid Build Coastguard Worker     }
276*8fb009dcSAndroid Build Coastguard Worker     bssl::UniquePtr<X509> cert =
277*8fb009dcSAndroid Build Coastguard Worker         MakeSelfSignedCert(evp_pkey.get(), 365 /* valid_days */);
278*8fb009dcSAndroid Build Coastguard Worker     if (!cert) {
279*8fb009dcSAndroid Build Coastguard Worker       return false;
280*8fb009dcSAndroid Build Coastguard Worker     }
281*8fb009dcSAndroid Build Coastguard Worker     if (!SSL_CTX_use_PrivateKey(ctx.get(), evp_pkey.get())) {
282*8fb009dcSAndroid Build Coastguard Worker       fprintf(stderr, "Failed to set private key.\n");
283*8fb009dcSAndroid Build Coastguard Worker       return false;
284*8fb009dcSAndroid Build Coastguard Worker     }
285*8fb009dcSAndroid Build Coastguard Worker     if (!SSL_CTX_use_certificate(ctx.get(), cert.get())) {
286*8fb009dcSAndroid Build Coastguard Worker       fprintf(stderr, "Failed to set certificate.\n");
287*8fb009dcSAndroid Build Coastguard Worker       return false;
288*8fb009dcSAndroid Build Coastguard Worker     }
289*8fb009dcSAndroid Build Coastguard Worker   }
290*8fb009dcSAndroid Build Coastguard Worker 
291*8fb009dcSAndroid Build Coastguard Worker   if (args_map.count("-ech-key") + args_map.count("-ech-config") == 1) {
292*8fb009dcSAndroid Build Coastguard Worker     fprintf(stderr,
293*8fb009dcSAndroid Build Coastguard Worker             "-ech-config and -ech-key must be specified together.\n");
294*8fb009dcSAndroid Build Coastguard Worker     return false;
295*8fb009dcSAndroid Build Coastguard Worker   }
296*8fb009dcSAndroid Build Coastguard Worker 
297*8fb009dcSAndroid Build Coastguard Worker   if (args_map.count("-ech-key") != 0) {
298*8fb009dcSAndroid Build Coastguard Worker     // Load the ECH private key.
299*8fb009dcSAndroid Build Coastguard Worker     std::string ech_key_path = args_map["-ech-key"];
300*8fb009dcSAndroid Build Coastguard Worker     ScopedFILE ech_key_file(fopen(ech_key_path.c_str(), "rb"));
301*8fb009dcSAndroid Build Coastguard Worker     std::vector<uint8_t> ech_key;
302*8fb009dcSAndroid Build Coastguard Worker     if (ech_key_file == nullptr ||
303*8fb009dcSAndroid Build Coastguard Worker         !ReadAll(&ech_key, ech_key_file.get())) {
304*8fb009dcSAndroid Build Coastguard Worker       fprintf(stderr, "Error reading %s\n", ech_key_path.c_str());
305*8fb009dcSAndroid Build Coastguard Worker       return false;
306*8fb009dcSAndroid Build Coastguard Worker     }
307*8fb009dcSAndroid Build Coastguard Worker 
308*8fb009dcSAndroid Build Coastguard Worker     // Load the ECHConfig.
309*8fb009dcSAndroid Build Coastguard Worker     std::string ech_config_path = args_map["-ech-config"];
310*8fb009dcSAndroid Build Coastguard Worker     ScopedFILE ech_config_file(fopen(ech_config_path.c_str(), "rb"));
311*8fb009dcSAndroid Build Coastguard Worker     std::vector<uint8_t> ech_config;
312*8fb009dcSAndroid Build Coastguard Worker     if (ech_config_file == nullptr ||
313*8fb009dcSAndroid Build Coastguard Worker         !ReadAll(&ech_config, ech_config_file.get())) {
314*8fb009dcSAndroid Build Coastguard Worker       fprintf(stderr, "Error reading %s\n", ech_config_path.c_str());
315*8fb009dcSAndroid Build Coastguard Worker       return false;
316*8fb009dcSAndroid Build Coastguard Worker     }
317*8fb009dcSAndroid Build Coastguard Worker 
318*8fb009dcSAndroid Build Coastguard Worker     bssl::UniquePtr<SSL_ECH_KEYS> keys(SSL_ECH_KEYS_new());
319*8fb009dcSAndroid Build Coastguard Worker     bssl::ScopedEVP_HPKE_KEY key;
320*8fb009dcSAndroid Build Coastguard Worker     if (!keys ||
321*8fb009dcSAndroid Build Coastguard Worker         !EVP_HPKE_KEY_init(key.get(), EVP_hpke_x25519_hkdf_sha256(),
322*8fb009dcSAndroid Build Coastguard Worker                            ech_key.data(), ech_key.size()) ||
323*8fb009dcSAndroid Build Coastguard Worker         !SSL_ECH_KEYS_add(keys.get(),
324*8fb009dcSAndroid Build Coastguard Worker                           /*is_retry_config=*/1, ech_config.data(),
325*8fb009dcSAndroid Build Coastguard Worker                           ech_config.size(), key.get()) ||
326*8fb009dcSAndroid Build Coastguard Worker         !SSL_CTX_set1_ech_keys(ctx.get(), keys.get())) {
327*8fb009dcSAndroid Build Coastguard Worker       fprintf(stderr, "Error setting server's ECHConfig and private key\n");
328*8fb009dcSAndroid Build Coastguard Worker       return false;
329*8fb009dcSAndroid Build Coastguard Worker     }
330*8fb009dcSAndroid Build Coastguard Worker   }
331*8fb009dcSAndroid Build Coastguard Worker 
332*8fb009dcSAndroid Build Coastguard Worker   if (args_map.count("-cipher") != 0 &&
333*8fb009dcSAndroid Build Coastguard Worker       !SSL_CTX_set_strict_cipher_list(ctx.get(), args_map["-cipher"].c_str())) {
334*8fb009dcSAndroid Build Coastguard Worker     fprintf(stderr, "Failed setting cipher list\n");
335*8fb009dcSAndroid Build Coastguard Worker     return false;
336*8fb009dcSAndroid Build Coastguard Worker   }
337*8fb009dcSAndroid Build Coastguard Worker 
338*8fb009dcSAndroid Build Coastguard Worker   if (args_map.count("-curves") != 0 &&
339*8fb009dcSAndroid Build Coastguard Worker       !SSL_CTX_set1_curves_list(ctx.get(), args_map["-curves"].c_str())) {
340*8fb009dcSAndroid Build Coastguard Worker     fprintf(stderr, "Failed setting curves list\n");
341*8fb009dcSAndroid Build Coastguard Worker     return false;
342*8fb009dcSAndroid Build Coastguard Worker   }
343*8fb009dcSAndroid Build Coastguard Worker 
344*8fb009dcSAndroid Build Coastguard Worker   uint16_t max_version = TLS1_3_VERSION;
345*8fb009dcSAndroid Build Coastguard Worker   if (args_map.count("-max-version") != 0 &&
346*8fb009dcSAndroid Build Coastguard Worker       !VersionFromString(&max_version, args_map["-max-version"])) {
347*8fb009dcSAndroid Build Coastguard Worker     fprintf(stderr, "Unknown protocol version: '%s'\n",
348*8fb009dcSAndroid Build Coastguard Worker             args_map["-max-version"].c_str());
349*8fb009dcSAndroid Build Coastguard Worker     return false;
350*8fb009dcSAndroid Build Coastguard Worker   }
351*8fb009dcSAndroid Build Coastguard Worker 
352*8fb009dcSAndroid Build Coastguard Worker   if (!SSL_CTX_set_max_proto_version(ctx.get(), max_version)) {
353*8fb009dcSAndroid Build Coastguard Worker     return false;
354*8fb009dcSAndroid Build Coastguard Worker   }
355*8fb009dcSAndroid Build Coastguard Worker 
356*8fb009dcSAndroid Build Coastguard Worker   if (args_map.count("-min-version") != 0) {
357*8fb009dcSAndroid Build Coastguard Worker     uint16_t version;
358*8fb009dcSAndroid Build Coastguard Worker     if (!VersionFromString(&version, args_map["-min-version"])) {
359*8fb009dcSAndroid Build Coastguard Worker       fprintf(stderr, "Unknown protocol version: '%s'\n",
360*8fb009dcSAndroid Build Coastguard Worker               args_map["-min-version"].c_str());
361*8fb009dcSAndroid Build Coastguard Worker       return false;
362*8fb009dcSAndroid Build Coastguard Worker     }
363*8fb009dcSAndroid Build Coastguard Worker     if (!SSL_CTX_set_min_proto_version(ctx.get(), version)) {
364*8fb009dcSAndroid Build Coastguard Worker       return false;
365*8fb009dcSAndroid Build Coastguard Worker     }
366*8fb009dcSAndroid Build Coastguard Worker   }
367*8fb009dcSAndroid Build Coastguard Worker 
368*8fb009dcSAndroid Build Coastguard Worker   if (args_map.count("-ocsp-response") != 0 &&
369*8fb009dcSAndroid Build Coastguard Worker       !LoadOCSPResponse(ctx.get(), args_map["-ocsp-response"].c_str())) {
370*8fb009dcSAndroid Build Coastguard Worker     fprintf(stderr, "Failed to load OCSP response: %s\n", args_map["-ocsp-response"].c_str());
371*8fb009dcSAndroid Build Coastguard Worker     return false;
372*8fb009dcSAndroid Build Coastguard Worker   }
373*8fb009dcSAndroid Build Coastguard Worker 
374*8fb009dcSAndroid Build Coastguard Worker   if (args_map.count("-early-data") != 0) {
375*8fb009dcSAndroid Build Coastguard Worker     SSL_CTX_set_early_data_enabled(ctx.get(), 1);
376*8fb009dcSAndroid Build Coastguard Worker   }
377*8fb009dcSAndroid Build Coastguard Worker 
378*8fb009dcSAndroid Build Coastguard Worker   if (args_map.count("-debug") != 0) {
379*8fb009dcSAndroid Build Coastguard Worker     SSL_CTX_set_info_callback(ctx.get(), InfoCallback);
380*8fb009dcSAndroid Build Coastguard Worker   }
381*8fb009dcSAndroid Build Coastguard Worker 
382*8fb009dcSAndroid Build Coastguard Worker   if (args_map.count("-require-any-client-cert") != 0) {
383*8fb009dcSAndroid Build Coastguard Worker     SSL_CTX_set_verify(
384*8fb009dcSAndroid Build Coastguard Worker         ctx.get(), SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT, nullptr);
385*8fb009dcSAndroid Build Coastguard Worker     SSL_CTX_set_cert_verify_callback(
386*8fb009dcSAndroid Build Coastguard Worker         ctx.get(), [](X509_STORE_CTX *store, void *arg) -> int { return 1; },
387*8fb009dcSAndroid Build Coastguard Worker         nullptr);
388*8fb009dcSAndroid Build Coastguard Worker   }
389*8fb009dcSAndroid Build Coastguard Worker 
390*8fb009dcSAndroid Build Coastguard Worker   Listener listener;
391*8fb009dcSAndroid Build Coastguard Worker   if (!listener.Init(args_map["-accept"])) {
392*8fb009dcSAndroid Build Coastguard Worker     return false;
393*8fb009dcSAndroid Build Coastguard Worker   }
394*8fb009dcSAndroid Build Coastguard Worker 
395*8fb009dcSAndroid Build Coastguard Worker   bool result = true;
396*8fb009dcSAndroid Build Coastguard Worker   do {
397*8fb009dcSAndroid Build Coastguard Worker     int sock = -1;
398*8fb009dcSAndroid Build Coastguard Worker     if (!listener.Accept(&sock)) {
399*8fb009dcSAndroid Build Coastguard Worker       return false;
400*8fb009dcSAndroid Build Coastguard Worker     }
401*8fb009dcSAndroid Build Coastguard Worker 
402*8fb009dcSAndroid Build Coastguard Worker     BIO *bio = BIO_new_socket(sock, BIO_CLOSE);
403*8fb009dcSAndroid Build Coastguard Worker     bssl::UniquePtr<SSL> ssl(SSL_new(ctx.get()));
404*8fb009dcSAndroid Build Coastguard Worker     SSL_set_bio(ssl.get(), bio, bio);
405*8fb009dcSAndroid Build Coastguard Worker 
406*8fb009dcSAndroid Build Coastguard Worker     if (args_map.count("-jdk11-workaround") != 0) {
407*8fb009dcSAndroid Build Coastguard Worker       SSL_set_jdk11_workaround(ssl.get(), 1);
408*8fb009dcSAndroid Build Coastguard Worker     }
409*8fb009dcSAndroid Build Coastguard Worker 
410*8fb009dcSAndroid Build Coastguard Worker     int ret = SSL_accept(ssl.get());
411*8fb009dcSAndroid Build Coastguard Worker     if (ret != 1) {
412*8fb009dcSAndroid Build Coastguard Worker       int ssl_err = SSL_get_error(ssl.get(), ret);
413*8fb009dcSAndroid Build Coastguard Worker       PrintSSLError(stderr, "Error while connecting", ssl_err, ret);
414*8fb009dcSAndroid Build Coastguard Worker       result = false;
415*8fb009dcSAndroid Build Coastguard Worker       continue;
416*8fb009dcSAndroid Build Coastguard Worker     }
417*8fb009dcSAndroid Build Coastguard Worker 
418*8fb009dcSAndroid Build Coastguard Worker     fprintf(stderr, "Connected.\n");
419*8fb009dcSAndroid Build Coastguard Worker     bssl::UniquePtr<BIO> bio_stderr(BIO_new_fp(stderr, BIO_NOCLOSE));
420*8fb009dcSAndroid Build Coastguard Worker     PrintConnectionInfo(bio_stderr.get(), ssl.get());
421*8fb009dcSAndroid Build Coastguard Worker 
422*8fb009dcSAndroid Build Coastguard Worker     if (args_map.count("-www") != 0) {
423*8fb009dcSAndroid Build Coastguard Worker       result = HandleWWW(ssl.get());
424*8fb009dcSAndroid Build Coastguard Worker     } else {
425*8fb009dcSAndroid Build Coastguard Worker       result = TransferData(ssl.get(), sock);
426*8fb009dcSAndroid Build Coastguard Worker     }
427*8fb009dcSAndroid Build Coastguard Worker   } while (args_map.count("-loop") != 0);
428*8fb009dcSAndroid Build Coastguard Worker 
429*8fb009dcSAndroid Build Coastguard Worker   return result;
430*8fb009dcSAndroid Build Coastguard Worker }
431