Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
N
nghttp2
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Libraries
nghttp2
Commits
dbbf3a4a
Commit
dbbf3a4a
authored
Jan 16, 2016
by
Tatsuhiro Tsujikawa
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
nghttpx: Refactor TLS hostname match
parent
f25fd09b
Changes
6
Expand all
Hide whitespace changes
Inline
Side-by-side
Showing
6 changed files
with
237 additions
and
109 deletions
+237
-109
src/shrpx-unittest.cc
src/shrpx-unittest.cc
+2
-0
src/shrpx_ssl.cc
src/shrpx_ssl.cc
+178
-108
src/shrpx_ssl.h
src/shrpx_ssl.h
+14
-1
src/shrpx_ssl_test.cc
src/shrpx_ssl_test.cc
+33
-0
src/shrpx_ssl_test.h
src/shrpx_ssl_test.h
+1
-0
src/util.h
src/util.h
+9
-0
No files found.
src/shrpx-unittest.cc
View file @
dbbf3a4a
...
...
@@ -69,6 +69,8 @@ int main(int argc, char *argv[]) {
shrpx
::
test_shrpx_ssl_create_lookup_tree
)
||
!
CU_add_test
(
pSuite
,
"ssl_cert_lookup_tree_add_cert_from_file"
,
shrpx
::
test_shrpx_ssl_cert_lookup_tree_add_cert_from_file
)
||
!
CU_add_test
(
pSuite
,
"ssl_tls_hostname_match"
,
shrpx
::
test_shrpx_ssl_tls_hostname_match
)
||
!
CU_add_test
(
pSuite
,
"http2_add_header"
,
shrpx
::
test_http2_add_header
)
||
!
CU_add_test
(
pSuite
,
"http2_get_header"
,
shrpx
::
test_http2_get_header
)
||
!
CU_add_test
(
pSuite
,
"http2_copy_headers_to_nva"
,
...
...
src/shrpx_ssl.cc
View file @
dbbf3a4a
This diff is collapsed.
Click to expand it.
src/shrpx_ssl.h
View file @
dbbf3a4a
...
...
@@ -108,10 +108,16 @@ void get_altnames(X509 *cert, std::vector<std::string> &dns_names,
// them. If there is a match, its SSL_CTX is returned. If none
// matches, query is continued to the next character.
struct
WildcardCert
{
SSL_CTX
*
ssl_ctx
;
char
*
hostname
;
size_t
hostnamelen
;
};
struct
CertNode
{
// list of wildcard domain name and its SSL_CTX pair, the wildcard
// '*' appears in this position.
std
::
vector
<
std
::
pair
<
char
*
,
SSL_CTX
*>
>
wildcard_certs
;
std
::
vector
<
WildcardCert
>
wildcard_certs
;
// Next CertNode index of CertLookupTree::nodes
std
::
vector
<
std
::
unique_ptr
<
CertNode
>>
next
;
// SSL_CTX for exact match
...
...
@@ -198,6 +204,13 @@ SSL *create_ssl(SSL_CTX *ssl_ctx);
// Returns true if SSL/TLS is enabled on downstream
bool
downstream_tls_enabled
();
// Performs TLS hostname match. |pattern| of length |plen| can
// contain wildcard character '*', which matches prefix of target
// hostname. There are several restrictions to make wildcard work.
// The matching algorithm is based on RFC 6125.
bool
tls_hostname_match
(
const
char
*
pattern
,
size_t
plen
,
const
char
*
hostname
,
size_t
hlen
);
}
// namespace ssl
}
// namespace shrpx
...
...
src/shrpx_ssl_test.cc
View file @
dbbf3a4a
...
...
@@ -115,4 +115,37 @@ void test_shrpx_ssl_cert_lookup_tree_add_cert_from_file(void) {
SSL_CTX_free
(
ssl_ctx
);
}
template
<
size_t
N
,
size_t
M
>
bool
tls_hostname_match_wrapper
(
const
char
(
&
pattern
)[
N
],
const
char
(
&
hostname
)[
M
])
{
return
ssl
::
tls_hostname_match
(
pattern
,
N
,
hostname
,
M
);
}
void
test_shrpx_ssl_tls_hostname_match
(
void
)
{
CU_ASSERT
(
tls_hostname_match_wrapper
(
"example.com"
,
"example.com"
));
CU_ASSERT
(
tls_hostname_match_wrapper
(
"example.com"
,
"EXAMPLE.com"
));
// check wildcard
CU_ASSERT
(
tls_hostname_match_wrapper
(
"*.example.com"
,
"www.example.com"
));
CU_ASSERT
(
tls_hostname_match_wrapper
(
"*w.example.com"
,
"www.example.com"
));
CU_ASSERT
(
tls_hostname_match_wrapper
(
"www*.example.com"
,
"www1.example.com"
));
CU_ASSERT
(
tls_hostname_match_wrapper
(
"www*.example.com"
,
"WWW12.EXAMPLE.com"
));
// at least 2 dots are required after '*'
CU_ASSERT
(
!
tls_hostname_match_wrapper
(
"*.com"
,
"example.com"
));
CU_ASSERT
(
!
tls_hostname_match_wrapper
(
"*"
,
"example.com"
));
// '*' must be in left most label
CU_ASSERT
(
!
tls_hostname_match_wrapper
(
"blog.*.example.com"
,
"blog.my.example.com"
));
// prefix is wrong
CU_ASSERT
(
!
tls_hostname_match_wrapper
(
"client*.example.com"
,
"server.example.com"
));
// '*' must match at least one character
CU_ASSERT
(
!
tls_hostname_match_wrapper
(
"www*.example.com"
,
"www.example.com"
));
CU_ASSERT
(
!
tls_hostname_match_wrapper
(
"example.com"
,
"nghttp2.org"
));
CU_ASSERT
(
!
tls_hostname_match_wrapper
(
"www.example.com"
,
"example.com"
));
CU_ASSERT
(
!
tls_hostname_match_wrapper
(
"example.com"
,
"www.example.com"
));
}
}
// namespace shrpx
src/shrpx_ssl_test.h
View file @
dbbf3a4a
...
...
@@ -33,6 +33,7 @@ namespace shrpx {
void
test_shrpx_ssl_create_lookup_tree
(
void
);
void
test_shrpx_ssl_cert_lookup_tree_add_cert_from_file
(
void
);
void
test_shrpx_ssl_tls_hostname_match
(
void
);
}
// namespace shrpx
...
...
src/util.h
View file @
dbbf3a4a
...
...
@@ -258,6 +258,15 @@ bool strieq(InputIt1 a, size_t alen, InputIt2 b, size_t blen) {
return
std
::
equal
(
a
,
a
+
alen
,
b
,
CaseCmp
());
}
template
<
typename
InputIt1
,
typename
InputIt2
>
bool
strieq
(
InputIt1
first1
,
InputIt1
last1
,
InputIt2
first2
,
InputIt2
last2
)
{
if
(
std
::
distance
(
first1
,
last1
)
!=
std
::
distance
(
first2
,
last2
))
{
return
false
;
}
return
std
::
equal
(
first1
,
last1
,
first2
,
CaseCmp
());
}
inline
bool
strieq
(
const
std
::
string
&
a
,
const
std
::
string
&
b
)
{
return
strieq
(
std
::
begin
(
a
),
a
.
size
(),
std
::
begin
(
b
),
b
.
size
());
}
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment