You've already forked FFmpeg
							
							
				mirror of
				https://github.com/FFmpeg/FFmpeg.git
				synced 2025-10-30 23:18:11 +02:00 
			
		
		
		
	avformat: implement SChannel SSP TLS protocol
This implementation does not support TLS listen sockets and loading CA/Certs from files. The Windows API does not support loading PEM certs, and would either require a manual loader or instead be limited to loading Windows PFX certificates TLS listen sockets would have to be implemented quite separately, as many of the APIs are different for server-mode (as opposed to client mode).
This commit is contained in:
		
							
								
								
									
										14
									
								
								configure
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										14
									
								
								configure
									
									
									
									
										vendored
									
									
								
							| @@ -281,6 +281,8 @@ External library support: | ||||
|   --enable-opengl          enable OpenGL rendering [no] | ||||
|   --enable-openssl         enable openssl, needed for https support | ||||
|                            if gnutls is not used [no] | ||||
|   --disable-schannel       disable SChannel SSP, needed for TLS support on | ||||
|                            Windows if openssl and gnutls are not used [autodetect] | ||||
|   --disable-sdl            disable sdl [autodetect] | ||||
|   --disable-securetransport disable Secure Transport, needed for TLS support | ||||
|                            on OSX if openssl and gnutls are not used [autodetect] | ||||
| @@ -1468,6 +1470,7 @@ EXTERNAL_LIBRARY_LIST=" | ||||
|     opencl | ||||
|     opengl | ||||
|     openssl | ||||
|     schannel | ||||
|     sdl | ||||
|     securetransport | ||||
|     x11grab | ||||
| @@ -2763,13 +2766,15 @@ sctp_protocol_deps="struct_sctp_event_subscribe" | ||||
| sctp_protocol_select="network" | ||||
| srtp_protocol_select="rtp_protocol" | ||||
| tcp_protocol_select="network" | ||||
| tls_gnutls_protocol_deps="gnutls !tls_securetransport_protocol" | ||||
| tls_gnutls_protocol_deps="gnutls !tls_schannel_protocol !tls_securetransport_protocol" | ||||
| tls_gnutls_protocol_select="tcp_protocol" | ||||
| tls_openssl_protocol_deps="openssl !tls_securetransport_protocol !tls_gnutls_protocol" | ||||
| tls_openssl_protocol_deps="openssl !tls_schannel_protocol !tls_securetransport_protocol !tls_gnutls_protocol" | ||||
| tls_openssl_protocol_select="tcp_protocol" | ||||
| tls_schannel_protocol_deps="schannel" | ||||
| tls_schannel_protocol_select="tcp_protocol" | ||||
| tls_securetransport_protocol_deps="securetransport" | ||||
| tls_securetransport_protocol_select="tcp_protocol" | ||||
| tls_protocol_deps_any="tls_securetransport_protocol tls_gnutls_protocol tls_openssl_protocol" | ||||
| tls_protocol_deps_any="tls_schannel_protocol tls_securetransport_protocol tls_gnutls_protocol tls_openssl_protocol" | ||||
| udp_protocol_select="network" | ||||
| udplite_protocol_select="network" | ||||
| unix_protocol_deps="sys_un_h" | ||||
| @@ -5511,6 +5516,9 @@ disabled securetransport || { check_func SecIdentityCreate "-Wl,-framework,CoreF | ||||
|     check_lib2 "Security/SecureTransport.h Security/Security.h" "SSLCreateContext SecItemImport" "-Wl,-framework,CoreFoundation -Wl,-framework,Security" && | ||||
|     enable securetransport; } | ||||
|  | ||||
| disabled schannel || { check_func_headers "windows.h Security.h" InitializeSecurityContext -DSECURITY_WIN32 -lSecur32 && | ||||
|                        enable schannel && add_extralibs -lSecur32; } | ||||
|  | ||||
| makeinfo --version > /dev/null 2>&1 && enable makeinfo  || disable makeinfo | ||||
| enabled makeinfo \ | ||||
|     && [ 0$(makeinfo --version | grep "texinfo" | sed 's/.*texinfo[^0-9]*\([0-9]*\)\..*/\1/') -ge 5 ] \ | ||||
|   | ||||
| @@ -544,6 +544,7 @@ OBJS-$(CONFIG_SUBFILE_PROTOCOL)          += subfile.o | ||||
| OBJS-$(CONFIG_TCP_PROTOCOL)              += tcp.o | ||||
| OBJS-$(CONFIG_TLS_GNUTLS_PROTOCOL)       += tls_gnutls.o tls.o | ||||
| OBJS-$(CONFIG_TLS_OPENSSL_PROTOCOL)      += tls_openssl.o tls.o | ||||
| OBJS-$(CONFIG_TLS_SCHANNEL_PROTOCOL)     += tls_schannel.o tls.o | ||||
| OBJS-$(CONFIG_TLS_SECURETRANSPORT_PROTOCOL) += tls_securetransport.o tls.o | ||||
| OBJS-$(CONFIG_UDP_PROTOCOL)              += udp.o | ||||
| OBJS-$(CONFIG_UDPLITE_PROTOCOL)          += udp.o | ||||
|   | ||||
| @@ -395,6 +395,7 @@ void av_register_all(void) | ||||
|     REGISTER_PROTOCOL(SRTP,             srtp); | ||||
|     REGISTER_PROTOCOL(SUBFILE,          subfile); | ||||
|     REGISTER_PROTOCOL(TCP,              tcp); | ||||
|     REGISTER_PROTOCOL(TLS_SCHANNEL,     tls_schannel); | ||||
|     REGISTER_PROTOCOL(TLS_SECURETRANSPORT, tls_securetransport); | ||||
|     REGISTER_PROTOCOL(TLS_GNUTLS,       tls_gnutls); | ||||
|     REGISTER_PROTOCOL(TLS_OPENSSL,      tls_openssl); | ||||
|   | ||||
| @@ -26,7 +26,7 @@ | ||||
| #include "url.h" | ||||
| #include "libavutil/opt.h" | ||||
|  | ||||
| #define CONFIG_TLS_PROTOCOL (CONFIG_TLS_GNUTLS_PROTOCOL | CONFIG_TLS_OPENSSL_PROTOCOL | CONFIG_TLS_SECURETRANSPORT_PROTOCOL) | ||||
| #define CONFIG_TLS_PROTOCOL (CONFIG_TLS_GNUTLS_PROTOCOL | CONFIG_TLS_OPENSSL_PROTOCOL | CONFIG_TLS_SECURETRANSPORT_PROTOCOL | CONFIG_TLS_SCHANNEL_PROTOCOL) | ||||
|  | ||||
| typedef struct TLSShared { | ||||
|     char *ca_file; | ||||
|   | ||||
							
								
								
									
										600
									
								
								libavformat/tls_schannel.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										600
									
								
								libavformat/tls_schannel.c
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,600 @@ | ||||
| /* | ||||
|  * Copyright (c) 2015 Hendrik Leppkes | ||||
|  * | ||||
|  * This file is part of FFmpeg. | ||||
|  * | ||||
|  * FFmpeg is free software; you can redistribute it and/or | ||||
|  * modify it under the terms of the GNU Lesser General Public | ||||
|  * License as published by the Free Software Foundation; either | ||||
|  * version 2.1 of the License, or (at your option) any later version. | ||||
|  * | ||||
|  * FFmpeg is distributed in the hope that it will be useful, | ||||
|  * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||||
|  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU | ||||
|  * Lesser General Public License for more details. | ||||
|  * | ||||
|  * You should have received a copy of the GNU Lesser General Public | ||||
|  * License along with FFmpeg; if not, write to the Free Software | ||||
|  * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA | ||||
|  */ | ||||
|  | ||||
| /** Based on the CURL SChannel module */ | ||||
|  | ||||
| #include "avformat.h" | ||||
| #include "internal.h" | ||||
| #include "network.h" | ||||
| #include "os_support.h" | ||||
| #include "url.h" | ||||
| #include "tls.h" | ||||
|  | ||||
| #define SECURITY_WIN32 | ||||
| #include <security.h> | ||||
| #include <schnlsp.h> | ||||
|  | ||||
| #define SCHANNEL_INITIAL_BUFFER_SIZE   4096 | ||||
| #define SCHANNEL_FREE_BUFFER_SIZE      1024 | ||||
|  | ||||
| /* mingw does not define this symbol */ | ||||
| #ifndef SECBUFFER_ALERT | ||||
| #define SECBUFFER_ALERT                17 | ||||
| #endif | ||||
|  | ||||
| typedef struct TLSContext { | ||||
|     const AVClass *class; | ||||
|     TLSShared tls_shared; | ||||
|  | ||||
|     CredHandle cred_handle; | ||||
|     TimeStamp cred_timestamp; | ||||
|  | ||||
|     CtxtHandle ctxt_handle; | ||||
|     TimeStamp ctxt_timestamp; | ||||
|  | ||||
|     ULONG request_flags; | ||||
|     ULONG context_flags; | ||||
|  | ||||
|     uint8_t *enc_buf; | ||||
|     int enc_buf_size; | ||||
|     int enc_buf_offset; | ||||
|  | ||||
|     uint8_t *dec_buf; | ||||
|     int dec_buf_size; | ||||
|     int dec_buf_offset; | ||||
|  | ||||
|     SecPkgContext_StreamSizes sizes; | ||||
|  | ||||
|     int connected; | ||||
|     int connection_closed; | ||||
|     int sspi_close_notify; | ||||
| } TLSContext; | ||||
|  | ||||
| static void init_sec_buffer(SecBuffer *buffer, unsigned long type, | ||||
|                             void *data, unsigned long size) | ||||
| { | ||||
|     buffer->cbBuffer   = size; | ||||
|     buffer->BufferType = type; | ||||
|     buffer->pvBuffer   = data; | ||||
| } | ||||
|  | ||||
| static void init_sec_buffer_desc(SecBufferDesc *desc, SecBuffer *buffers, | ||||
|                                  unsigned long buffer_count) | ||||
| { | ||||
|     desc->ulVersion = SECBUFFER_VERSION; | ||||
|     desc->pBuffers = buffers; | ||||
|     desc->cBuffers = buffer_count; | ||||
| } | ||||
|  | ||||
| static int tls_shutdown_client(URLContext *h) | ||||
| { | ||||
|     TLSContext *c = h->priv_data; | ||||
|     TLSShared *s = &c->tls_shared; | ||||
|     int ret; | ||||
|  | ||||
|     if (c->connected) { | ||||
|         SecBufferDesc BuffDesc; | ||||
|         SecBuffer Buffer; | ||||
|         SECURITY_STATUS sspi_ret; | ||||
|         SecBuffer outbuf; | ||||
|         SecBufferDesc outbuf_desc; | ||||
|  | ||||
|         DWORD dwshut = SCHANNEL_SHUTDOWN; | ||||
|         init_sec_buffer(&Buffer, SECBUFFER_TOKEN, &dwshut, sizeof(dwshut)); | ||||
|         init_sec_buffer_desc(&BuffDesc, &Buffer, 1); | ||||
|  | ||||
|         sspi_ret = ApplyControlToken(&c->ctxt_handle, &BuffDesc); | ||||
|         if (sspi_ret != SEC_E_OK) | ||||
|             av_log(h, AV_LOG_ERROR, "ApplyControlToken failed\n"); | ||||
|  | ||||
|         init_sec_buffer(&outbuf, SECBUFFER_EMPTY, NULL, 0); | ||||
|         init_sec_buffer_desc(&outbuf_desc, &outbuf, 1); | ||||
|  | ||||
|         sspi_ret = InitializeSecurityContext(&c->cred_handle, &c->ctxt_handle, s->host, | ||||
|                                              c->request_flags, 0, 0, NULL, 0, &c->ctxt_handle, | ||||
|                                              &outbuf_desc, &c->context_flags, &c->ctxt_timestamp); | ||||
|         if (sspi_ret == SEC_E_OK || sspi_ret == SEC_I_CONTEXT_EXPIRED) { | ||||
|             ret = ffurl_write(s->tcp, outbuf.pvBuffer, outbuf.cbBuffer); | ||||
|             FreeContextBuffer(outbuf.pvBuffer); | ||||
|             if (ret < 0 || ret != outbuf.cbBuffer) | ||||
|                 av_log(h, AV_LOG_ERROR, "Failed to send close message\n"); | ||||
|         } | ||||
|  | ||||
|         c->connected = 0; | ||||
|     } | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| static int tls_close(URLContext *h) | ||||
| { | ||||
|     TLSContext *c = h->priv_data; | ||||
|  | ||||
|     tls_shutdown_client(h); | ||||
|  | ||||
|     DeleteSecurityContext(&c->ctxt_handle); | ||||
|     FreeCredentialsHandle(&c->cred_handle); | ||||
|  | ||||
|     av_freep(&c->enc_buf); | ||||
|     c->enc_buf_size = c->enc_buf_offset = 0; | ||||
|  | ||||
|     av_freep(&c->dec_buf); | ||||
|     c->dec_buf_size = c->dec_buf_offset = 0; | ||||
|  | ||||
|     if (c->tls_shared.tcp) | ||||
|         ffurl_close(c->tls_shared.tcp); | ||||
|     return 0; | ||||
| } | ||||
|  | ||||
| static int tls_client_handshake_loop(URLContext *h, int initial) | ||||
| { | ||||
|     TLSContext *c = h->priv_data; | ||||
|     TLSShared *s = &c->tls_shared; | ||||
|     SECURITY_STATUS sspi_ret; | ||||
|     SecBuffer outbuf[3]; | ||||
|     SecBufferDesc outbuf_desc; | ||||
|     SecBuffer inbuf[2]; | ||||
|     SecBufferDesc inbuf_desc; | ||||
|     int i, ret = 0, read_data = initial; | ||||
|  | ||||
|     if (c->enc_buf == NULL) { | ||||
|         c->enc_buf_offset = 0; | ||||
|         ret = av_reallocp(&c->enc_buf, SCHANNEL_INITIAL_BUFFER_SIZE); | ||||
|         if (ret < 0) | ||||
|             goto fail; | ||||
|         c->enc_buf_size = SCHANNEL_INITIAL_BUFFER_SIZE; | ||||
|     } | ||||
|  | ||||
|     if (c->dec_buf == NULL) { | ||||
|         c->dec_buf_offset = 0; | ||||
|         ret = av_reallocp(&c->dec_buf, SCHANNEL_INITIAL_BUFFER_SIZE); | ||||
|         if (ret < 0) | ||||
|             goto fail; | ||||
|         c->dec_buf_size = SCHANNEL_INITIAL_BUFFER_SIZE; | ||||
|     } | ||||
|  | ||||
|     while (1) { | ||||
|         if (c->enc_buf_size - c->enc_buf_offset < SCHANNEL_FREE_BUFFER_SIZE) { | ||||
|             c->enc_buf_size = c->enc_buf_offset + SCHANNEL_FREE_BUFFER_SIZE; | ||||
|             ret = av_reallocp(&c->enc_buf, c->enc_buf_size); | ||||
|             if (ret < 0) { | ||||
|                 c->enc_buf_size = c->enc_buf_offset = 0; | ||||
|                 goto fail; | ||||
|             } | ||||
|         } | ||||
|  | ||||
|         if (read_data) { | ||||
|             ret = ffurl_read(c->tls_shared.tcp, c->enc_buf + c->enc_buf_offset, | ||||
|                              c->enc_buf_size - c->enc_buf_offset); | ||||
|             if (ret < 0) { | ||||
|                 av_log(h, AV_LOG_ERROR, "Failed to read handshake response\n"); | ||||
|                 goto fail; | ||||
|             } | ||||
|             c->enc_buf_offset += ret; | ||||
|         } | ||||
|  | ||||
|         /* input buffers */ | ||||
|         init_sec_buffer(&inbuf[0], SECBUFFER_TOKEN, av_malloc(c->enc_buf_offset), c->enc_buf_offset); | ||||
|         init_sec_buffer(&inbuf[1], SECBUFFER_EMPTY, NULL, 0); | ||||
|         init_sec_buffer_desc(&inbuf_desc, inbuf, 2); | ||||
|  | ||||
|         if (inbuf[0].pvBuffer == NULL) { | ||||
|             av_log(h, AV_LOG_ERROR, "Failed to allocate input buffer\n"); | ||||
|             ret = AVERROR(ENOMEM); | ||||
|             goto fail; | ||||
|         } | ||||
|  | ||||
|         memcpy(inbuf[0].pvBuffer, c->enc_buf, c->enc_buf_offset); | ||||
|  | ||||
|         /* output buffers */ | ||||
|         init_sec_buffer(&outbuf[0], SECBUFFER_TOKEN, NULL, 0); | ||||
|         init_sec_buffer(&outbuf[1], SECBUFFER_ALERT, NULL, 0); | ||||
|         init_sec_buffer(&outbuf[2], SECBUFFER_EMPTY, NULL, 0); | ||||
|         init_sec_buffer_desc(&outbuf_desc, outbuf, 3); | ||||
|  | ||||
|         sspi_ret = InitializeSecurityContext(&c->cred_handle, &c->ctxt_handle, s->host, c->request_flags, | ||||
|                                              0, 0, &inbuf_desc, 0, NULL, &outbuf_desc, &c->context_flags, | ||||
|                                              &c->ctxt_timestamp); | ||||
|         av_freep(&inbuf[0].pvBuffer); | ||||
|  | ||||
|         if (sspi_ret == SEC_E_INCOMPLETE_MESSAGE) { | ||||
|             av_log(h, AV_LOG_DEBUG, "Received incomplete handshake, need more data\n"); | ||||
|             read_data = 1; | ||||
|             continue; | ||||
|         } | ||||
|  | ||||
|         /* remote requests a client certificate - attempt to continue without one anyway */ | ||||
|         if (sspi_ret == SEC_I_INCOMPLETE_CREDENTIALS && | ||||
|             !(c->request_flags & ISC_REQ_USE_SUPPLIED_CREDS)) { | ||||
|             av_log(h, AV_LOG_VERBOSE, "Client certificate has been requested, ignoring\n"); | ||||
|             c->request_flags |= ISC_REQ_USE_SUPPLIED_CREDS; | ||||
|             read_data = 0; | ||||
|             continue; | ||||
|         } | ||||
|  | ||||
|         /* continue handshake */ | ||||
|         if (sspi_ret == SEC_I_CONTINUE_NEEDED || sspi_ret == SEC_E_OK) { | ||||
|             for (i = 0; i < 3; i++) { | ||||
|                 if (outbuf[i].BufferType == SECBUFFER_TOKEN && outbuf[i].cbBuffer > 0) { | ||||
|                     ret = ffurl_write(c->tls_shared.tcp, outbuf[i].pvBuffer, outbuf[i].cbBuffer); | ||||
|                     if (ret < 0 || ret != outbuf[i].cbBuffer) { | ||||
|                         av_log(h, AV_LOG_VERBOSE, "Failed to send handshake data\n"); | ||||
|                         ret = AVERROR(EIO); | ||||
|                         goto fail; | ||||
|                     } | ||||
|                 } | ||||
|  | ||||
|                 if (outbuf[i].pvBuffer != NULL) { | ||||
|                     FreeContextBuffer(outbuf[i].pvBuffer); | ||||
|                     outbuf[i].pvBuffer = NULL; | ||||
|                 } | ||||
|             } | ||||
|         } else { | ||||
|             if (sspi_ret == SEC_E_WRONG_PRINCIPAL) | ||||
|                 av_log(h, AV_LOG_ERROR, "SNI or certificate check failed\n"); | ||||
|             else | ||||
|                 av_log(h, AV_LOG_ERROR, "Creating security context failed (0x%lx)\n", sspi_ret); | ||||
|             ret = AVERROR_UNKNOWN; | ||||
|             goto fail; | ||||
|         } | ||||
|  | ||||
|         if (inbuf[1].BufferType == SECBUFFER_EXTRA && inbuf[1].cbBuffer > 0) { | ||||
|             if (c->enc_buf_offset > inbuf[1].cbBuffer) { | ||||
|                 memmove(c->enc_buf, (c->enc_buf + c->enc_buf_offset) - inbuf[1].cbBuffer, | ||||
|                         inbuf[1].cbBuffer); | ||||
|                 c->enc_buf_offset = inbuf[1].cbBuffer; | ||||
|                 if (sspi_ret == SEC_I_CONTINUE_NEEDED) { | ||||
|                     read_data = 0; | ||||
|                     continue; | ||||
|                 } | ||||
|             } | ||||
|         } else { | ||||
|             c->enc_buf_offset  = 0; | ||||
|         } | ||||
|  | ||||
|         if (sspi_ret == SEC_I_CONTINUE_NEEDED) { | ||||
|             read_data = 1; | ||||
|             continue; | ||||
|         } | ||||
|  | ||||
|         break; | ||||
|     } | ||||
|  | ||||
|     return 0; | ||||
|  | ||||
| fail: | ||||
|     /* free any remaining output data */ | ||||
|     for (i = 0; i < 3; i++) { | ||||
|         if (outbuf[i].pvBuffer != NULL) { | ||||
|             FreeContextBuffer(outbuf[i].pvBuffer); | ||||
|             outbuf[i].pvBuffer = NULL; | ||||
|         } | ||||
|     } | ||||
|  | ||||
|     return ret; | ||||
| } | ||||
|  | ||||
| static int tls_client_handshake(URLContext *h) | ||||
| { | ||||
|     TLSContext *c = h->priv_data; | ||||
|     TLSShared *s = &c->tls_shared; | ||||
|     SecBuffer outbuf; | ||||
|     SecBufferDesc outbuf_desc; | ||||
|     SECURITY_STATUS sspi_ret; | ||||
|     int ret; | ||||
|  | ||||
|     init_sec_buffer(&outbuf, SECBUFFER_EMPTY, NULL, 0); | ||||
|     init_sec_buffer_desc(&outbuf_desc, &outbuf, 1); | ||||
|  | ||||
|     c->request_flags = ISC_REQ_SEQUENCE_DETECT | ISC_REQ_REPLAY_DETECT | | ||||
|                        ISC_REQ_CONFIDENTIALITY | ISC_REQ_ALLOCATE_MEMORY | | ||||
|                        ISC_REQ_STREAM; | ||||
|  | ||||
|     sspi_ret = InitializeSecurityContext(&c->cred_handle, NULL, s->host, c->request_flags, 0, 0, | ||||
|                                          NULL, 0, &c->ctxt_handle, &outbuf_desc, &c->context_flags, | ||||
|                                          &c->ctxt_timestamp); | ||||
|     if (sspi_ret != SEC_I_CONTINUE_NEEDED) { | ||||
|         av_log(h, AV_LOG_ERROR, "Unable to create initial security context (0x%lx)\n", sspi_ret); | ||||
|         ret = AVERROR_UNKNOWN; | ||||
|         goto fail; | ||||
|     } | ||||
|  | ||||
|     ret = ffurl_write(s->tcp, outbuf.pvBuffer, outbuf.cbBuffer); | ||||
|     FreeContextBuffer(outbuf.pvBuffer); | ||||
|     if (ret < 0 || ret != outbuf.cbBuffer) { | ||||
|         av_log(h, AV_LOG_ERROR, "Failed to send initial handshake data\n"); | ||||
|         ret = AVERROR(EIO); | ||||
|         goto fail; | ||||
|     } | ||||
|  | ||||
|     return tls_client_handshake_loop(h, 1); | ||||
|  | ||||
| fail: | ||||
|     DeleteSecurityContext(&c->ctxt_handle); | ||||
|     return ret; | ||||
| } | ||||
|  | ||||
| static int tls_open(URLContext *h, const char *uri, int flags, AVDictionary **options) | ||||
| { | ||||
|     TLSContext *c = h->priv_data; | ||||
|     TLSShared *s = &c->tls_shared; | ||||
|     SECURITY_STATUS sspi_ret; | ||||
|     SCHANNEL_CRED schannel_cred = { 0 }; | ||||
|     int ret; | ||||
|  | ||||
|     if ((ret = ff_tls_open_underlying(s, h, uri, options)) < 0) | ||||
|         goto fail; | ||||
|  | ||||
|     if (s->listen) { | ||||
|         av_log(h, AV_LOG_ERROR, "TLS Listen Sockets with SChannel is not implemented.\n"); | ||||
|         ret = AVERROR(EINVAL); | ||||
|         goto fail; | ||||
|     } | ||||
|  | ||||
|     /* SChannel Options */ | ||||
|     schannel_cred.dwVersion = SCHANNEL_CRED_VERSION; | ||||
|  | ||||
|     if (s->verify) | ||||
|         schannel_cred.dwFlags = SCH_CRED_AUTO_CRED_VALIDATION | | ||||
|                                 SCH_CRED_REVOCATION_CHECK_CHAIN; | ||||
|     else | ||||
|         schannel_cred.dwFlags = SCH_CRED_MANUAL_CRED_VALIDATION | | ||||
|                                 SCH_CRED_IGNORE_NO_REVOCATION_CHECK | | ||||
|                                 SCH_CRED_IGNORE_REVOCATION_OFFLINE; | ||||
|  | ||||
|     /* Get credential handle */ | ||||
|     sspi_ret = AcquireCredentialsHandle(NULL, (TCHAR *)UNISP_NAME, SECPKG_CRED_OUTBOUND, | ||||
|                                         NULL,  &schannel_cred, NULL, NULL, &c->cred_handle, | ||||
|                                         &c->cred_timestamp); | ||||
|     if (sspi_ret != SEC_E_OK) { | ||||
|         av_log(h, AV_LOG_ERROR, "Unable to acquire security credentials (0x%lx)\n", sspi_ret); | ||||
|         ret = AVERROR_UNKNOWN; | ||||
|         goto fail; | ||||
|     } | ||||
|  | ||||
|     ret = tls_client_handshake(h); | ||||
|     if (ret < 0) | ||||
|         goto fail; | ||||
|  | ||||
|     c->connected = 1; | ||||
|  | ||||
|     return 0; | ||||
|  | ||||
| fail: | ||||
|     tls_close(h); | ||||
|     return ret; | ||||
| } | ||||
|  | ||||
| static int tls_read(URLContext *h, uint8_t *buf, int len) | ||||
| { | ||||
|     TLSContext *c = h->priv_data; | ||||
|     TLSShared *s = &c->tls_shared; | ||||
|     SECURITY_STATUS sspi_ret = SEC_E_OK; | ||||
|     SecBuffer inbuf[4]; | ||||
|     SecBufferDesc inbuf_desc; | ||||
|     int size, ret; | ||||
|     int min_enc_buf_size = len + SCHANNEL_FREE_BUFFER_SIZE; | ||||
|  | ||||
|     if (len <= c->dec_buf_offset) | ||||
|         goto cleanup; | ||||
|  | ||||
|     if (c->sspi_close_notify) | ||||
|         goto cleanup; | ||||
|  | ||||
|     if (!c->connection_closed) { | ||||
|         size = c->enc_buf_size - c->enc_buf_offset; | ||||
|         if (size < SCHANNEL_FREE_BUFFER_SIZE || c->enc_buf_size < min_enc_buf_size) { | ||||
|             c->enc_buf_size = c->enc_buf_offset + SCHANNEL_FREE_BUFFER_SIZE; | ||||
|             if (c->enc_buf_size < min_enc_buf_size) | ||||
|                 c->enc_buf_size = min_enc_buf_size; | ||||
|             ret = av_reallocp(&c->enc_buf, c->enc_buf_size); | ||||
|             if (ret < 0) { | ||||
|                 c->enc_buf_size = c->enc_buf_offset = 0; | ||||
|                 return ret; | ||||
|             } | ||||
|         } | ||||
|  | ||||
|         ret = ffurl_read(s->tcp, c->enc_buf + c->enc_buf_offset, | ||||
|                          c->enc_buf_size - c->enc_buf_offset); | ||||
|         if (ret < 0) { | ||||
|             av_log(h, AV_LOG_ERROR, "Unable to read from socket\n"); | ||||
|             return ret; | ||||
|         } else if (ret == 0) | ||||
|             c->connection_closed = 1; | ||||
|  | ||||
|         c->enc_buf_offset += ret; | ||||
|     } | ||||
|  | ||||
|     while (c->enc_buf_offset > 0 && sspi_ret == SEC_E_OK && c->dec_buf_offset < len) { | ||||
|         /*  input buffer */ | ||||
|         init_sec_buffer(&inbuf[0], SECBUFFER_DATA, c->enc_buf, c->enc_buf_offset); | ||||
|  | ||||
|         /* additional buffers for possible output */ | ||||
|         init_sec_buffer(&inbuf[1], SECBUFFER_EMPTY, NULL, 0); | ||||
|         init_sec_buffer(&inbuf[2], SECBUFFER_EMPTY, NULL, 0); | ||||
|         init_sec_buffer(&inbuf[3], SECBUFFER_EMPTY, NULL, 0); | ||||
|         init_sec_buffer_desc(&inbuf_desc, inbuf, 4); | ||||
|  | ||||
|         sspi_ret = DecryptMessage(&c->ctxt_handle, &inbuf_desc, 0, NULL); | ||||
|         if (sspi_ret == SEC_E_OK || sspi_ret == SEC_I_RENEGOTIATE || | ||||
|             sspi_ret == SEC_I_CONTEXT_EXPIRED) { | ||||
|             /* handle decrypted data */ | ||||
|             if (inbuf[1].BufferType == SECBUFFER_DATA) { | ||||
|                 /* grow buffer if needed */ | ||||
|                 size = inbuf[1].cbBuffer > SCHANNEL_FREE_BUFFER_SIZE ? | ||||
|                        inbuf[1].cbBuffer : SCHANNEL_FREE_BUFFER_SIZE; | ||||
|                 if (c->dec_buf_size - c->dec_buf_offset < size || c->dec_buf_size < len)  { | ||||
|                     c->dec_buf_size = c->dec_buf_offset + size; | ||||
|                     if (c->dec_buf_size < len) | ||||
|                         c->dec_buf_size = len; | ||||
|                     ret = av_reallocp(&c->dec_buf, c->dec_buf_size); | ||||
|                     if (ret < 0) { | ||||
|                         c->dec_buf_size = c->dec_buf_offset = 0; | ||||
|                         return ret; | ||||
|                     } | ||||
|                 } | ||||
|  | ||||
|                 /* copy decrypted data to buffer */ | ||||
|                 size = inbuf[1].cbBuffer; | ||||
|                 if (size) { | ||||
|                     memcpy(c->dec_buf + c->dec_buf_offset, inbuf[1].pvBuffer, size); | ||||
|                     c->dec_buf_offset += size; | ||||
|                 } | ||||
|             } | ||||
|             if (inbuf[3].BufferType == SECBUFFER_EXTRA && inbuf[3].cbBuffer > 0) { | ||||
|                 if (c->enc_buf_offset > inbuf[3].cbBuffer) { | ||||
|                     memmove(c->enc_buf, (c->enc_buf + c->enc_buf_offset) - inbuf[3].cbBuffer, | ||||
|                     inbuf[3].cbBuffer); | ||||
|                     c->enc_buf_offset = inbuf[3].cbBuffer; | ||||
|                 } | ||||
|             } else | ||||
|                 c->enc_buf_offset = 0; | ||||
|  | ||||
|             if (sspi_ret == SEC_I_RENEGOTIATE) { | ||||
|                 if (c->enc_buf_offset) { | ||||
|                     av_log(h, AV_LOG_ERROR, "Cannot renegotiate, encrypted data buffer not empty\n"); | ||||
|                     ret = AVERROR_UNKNOWN; | ||||
|                     goto cleanup; | ||||
|                 } | ||||
|  | ||||
|                 av_log(h, AV_LOG_VERBOSE, "Re-negotiating security context\n"); | ||||
|                 ret = tls_client_handshake_loop(h, 0); | ||||
|                 if (ret < 0) { | ||||
|                     goto cleanup; | ||||
|                 } | ||||
|                 sspi_ret = SEC_E_OK; | ||||
|                 continue; | ||||
|             } else if (sspi_ret == SEC_I_CONTEXT_EXPIRED) { | ||||
|                 c->sspi_close_notify = 1; | ||||
|                 if (!c->connection_closed) { | ||||
|                     c->connection_closed = 1; | ||||
|                     av_log(h, AV_LOG_VERBOSE, "Server closed the connection\n"); | ||||
|                 } | ||||
|                 ret = 0; | ||||
|                 goto cleanup; | ||||
|             } | ||||
|         } else if (sspi_ret == SEC_E_INCOMPLETE_MESSAGE) { | ||||
|             ret = AVERROR(EAGAIN); | ||||
|             goto cleanup; | ||||
|         } else { | ||||
|             av_log(h, AV_LOG_ERROR, "Unable to decrypt message\n"); | ||||
|             ret = AVERROR(EIO); | ||||
|             goto cleanup; | ||||
|         } | ||||
|     } | ||||
|  | ||||
|     ret = 0; | ||||
|  | ||||
| cleanup: | ||||
|     size = FFMIN(len, c->dec_buf_offset); | ||||
|     if (size) { | ||||
|         memcpy(buf, c->dec_buf, size); | ||||
|         memmove(c->dec_buf, c->dec_buf + size, c->dec_buf_offset - size); | ||||
|         c->dec_buf_offset -= size; | ||||
|  | ||||
|         return size; | ||||
|     } | ||||
|  | ||||
|     if (ret == 0 && !c->connection_closed) | ||||
|         ret = AVERROR(EAGAIN); | ||||
|  | ||||
|     return ret < 0 ? ret : 0; | ||||
| } | ||||
|  | ||||
| static int tls_write(URLContext *h, const uint8_t *buf, int len) | ||||
| { | ||||
|     TLSContext *c = h->priv_data; | ||||
|     TLSShared *s = &c->tls_shared; | ||||
|     SECURITY_STATUS sspi_ret; | ||||
|     int ret = 0, data_size; | ||||
|     uint8_t *data = NULL; | ||||
|     SecBuffer outbuf[4]; | ||||
|     SecBufferDesc outbuf_desc; | ||||
|  | ||||
|     if (c->sizes.cbMaximumMessage == 0) { | ||||
|         sspi_ret = QueryContextAttributes(&c->ctxt_handle, SECPKG_ATTR_STREAM_SIZES, &c->sizes); | ||||
|         if (sspi_ret != SEC_E_OK) | ||||
|             return AVERROR_UNKNOWN; | ||||
|     } | ||||
|  | ||||
|     /* limit how much data we can consume */ | ||||
|     len = FFMIN(len, c->sizes.cbMaximumMessage); | ||||
|  | ||||
|     data_size = c->sizes.cbHeader + len + c->sizes.cbTrailer; | ||||
|     data = av_malloc(data_size); | ||||
|     if (data == NULL) | ||||
|         return AVERROR(ENOMEM); | ||||
|  | ||||
|     init_sec_buffer(&outbuf[0], SECBUFFER_STREAM_HEADER, | ||||
|                   data, c->sizes.cbHeader); | ||||
|     init_sec_buffer(&outbuf[1], SECBUFFER_DATA, | ||||
|                   data + c->sizes.cbHeader, len); | ||||
|     init_sec_buffer(&outbuf[2], SECBUFFER_STREAM_TRAILER, | ||||
|                   data + c->sizes.cbHeader + len, | ||||
|                   c->sizes.cbTrailer); | ||||
|     init_sec_buffer(&outbuf[3], SECBUFFER_EMPTY, NULL, 0); | ||||
|     init_sec_buffer_desc(&outbuf_desc, outbuf, 4); | ||||
|  | ||||
|     memcpy(outbuf[1].pvBuffer, buf, len); | ||||
|  | ||||
|     sspi_ret = EncryptMessage(&c->ctxt_handle, 0, &outbuf_desc, 0); | ||||
|     if (sspi_ret == SEC_E_OK)  { | ||||
|         len = outbuf[0].cbBuffer + outbuf[1].cbBuffer + outbuf[2].cbBuffer; | ||||
|         ret = ffurl_write(s->tcp, data, len); | ||||
|         if (ret < 0 || ret != len) { | ||||
|             ret = AVERROR(EIO); | ||||
|             av_log(h, AV_LOG_ERROR, "Writing encrypted data to socket failed\n"); | ||||
|             goto done; | ||||
|         } | ||||
|     } else { | ||||
|         av_log(h, AV_LOG_ERROR, "Encrypting data failed\n"); | ||||
|         if (sspi_ret == SEC_E_INSUFFICIENT_MEMORY) | ||||
|             ret = AVERROR(ENOMEM); | ||||
|         else | ||||
|             ret = AVERROR(EIO); | ||||
|         goto done; | ||||
|     } | ||||
|  | ||||
| done: | ||||
|     av_freep(&data); | ||||
|     return ret < 0 ? ret : outbuf[1].cbBuffer; | ||||
| } | ||||
|  | ||||
| static const AVOption options[] = { | ||||
|     TLS_COMMON_OPTIONS(TLSContext, tls_shared), | ||||
|     { NULL } | ||||
| }; | ||||
|  | ||||
| static const AVClass tls_class = { | ||||
|     .class_name = "tls", | ||||
|     .item_name  = av_default_item_name, | ||||
|     .option     = options, | ||||
|     .version    = LIBAVUTIL_VERSION_INT, | ||||
| }; | ||||
|  | ||||
| URLProtocol ff_tls_schannel_protocol = { | ||||
|     .name           = "tls", | ||||
|     .url_open2      = tls_open, | ||||
|     .url_read       = tls_read, | ||||
|     .url_write      = tls_write, | ||||
|     .url_close      = tls_close, | ||||
|     .priv_data_size = sizeof(TLSContext), | ||||
|     .flags          = URL_PROTOCOL_FLAG_NETWORK, | ||||
|     .priv_data_class = &tls_class, | ||||
| }; | ||||
		Reference in New Issue
	
	Block a user