vtls.c 40 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481
  1. /***************************************************************************
  2. * _ _ ____ _
  3. * Project ___| | | | _ \| |
  4. * / __| | | | |_) | |
  5. * | (__| |_| | _ <| |___
  6. * \___|\___/|_| \_\_____|
  7. *
  8. * Copyright (C) 1998 - 2022, Daniel Stenberg, <daniel@haxx.se>, et al.
  9. *
  10. * This software is licensed as described in the file COPYING, which
  11. * you should have received as part of this distribution. The terms
  12. * are also available at https://curl.se/docs/copyright.html.
  13. *
  14. * You may opt to use, copy, modify, merge, publish, distribute and/or sell
  15. * copies of the Software, and permit persons to whom the Software is
  16. * furnished to do so, under the terms of the COPYING file.
  17. *
  18. * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
  19. * KIND, either express or implied.
  20. *
  21. ***************************************************************************/
  22. /* This file is for implementing all "generic" SSL functions that all libcurl
  23. internals should use. It is then responsible for calling the proper
  24. "backend" function.
  25. SSL-functions in libcurl should call functions in this source file, and not
  26. to any specific SSL-layer.
  27. Curl_ssl_ - prefix for generic ones
  28. Note that this source code uses the functions of the configured SSL
  29. backend via the global Curl_ssl instance.
  30. "SSL/TLS Strong Encryption: An Introduction"
  31. https://httpd.apache.org/docs/2.0/ssl/ssl_intro.html
  32. */
  33. #include "curl_setup.h"
  34. #ifdef HAVE_SYS_TYPES_H
  35. #include <sys/types.h>
  36. #endif
  37. #ifdef HAVE_SYS_STAT_H
  38. #include <sys/stat.h>
  39. #endif
  40. #ifdef HAVE_FCNTL_H
  41. #include <fcntl.h>
  42. #endif
  43. #include "urldata.h"
  44. #include "vtls.h" /* generic SSL protos etc */
  45. #include "slist.h"
  46. #include "sendf.h"
  47. #include "strcase.h"
  48. #include "url.h"
  49. #include "progress.h"
  50. #include "share.h"
  51. #include "multiif.h"
  52. #include "timeval.h"
  53. #include "curl_md5.h"
  54. #include "warnless.h"
  55. #include "curl_base64.h"
  56. #include "curl_printf.h"
  57. #include "strdup.h"
  58. /* The last #include files should be: */
  59. #include "curl_memory.h"
  60. #include "memdebug.h"
  61. /* convenience macro to check if this handle is using a shared SSL session */
  62. #define SSLSESSION_SHARED(data) (data->share && \
  63. (data->share->specifier & \
  64. (1<<CURL_LOCK_DATA_SSL_SESSION)))
  65. #define CLONE_STRING(var) \
  66. do { \
  67. if(source->var) { \
  68. dest->var = strdup(source->var); \
  69. if(!dest->var) \
  70. return FALSE; \
  71. } \
  72. else \
  73. dest->var = NULL; \
  74. } while(0)
  75. #define CLONE_BLOB(var) \
  76. do { \
  77. if(blobdup(&dest->var, source->var)) \
  78. return FALSE; \
  79. } while(0)
  80. static CURLcode blobdup(struct curl_blob **dest,
  81. struct curl_blob *src)
  82. {
  83. DEBUGASSERT(dest);
  84. DEBUGASSERT(!*dest);
  85. if(src) {
  86. /* only if there's data to dupe! */
  87. struct curl_blob *d;
  88. d = malloc(sizeof(struct curl_blob) + src->len);
  89. if(!d)
  90. return CURLE_OUT_OF_MEMORY;
  91. d->len = src->len;
  92. /* Always duplicate because the connection may survive longer than the
  93. handle that passed in the blob. */
  94. d->flags = CURL_BLOB_COPY;
  95. d->data = (void *)((char *)d + sizeof(struct curl_blob));
  96. memcpy(d->data, src->data, src->len);
  97. *dest = d;
  98. }
  99. return CURLE_OK;
  100. }
  101. /* returns TRUE if the blobs are identical */
  102. static bool blobcmp(struct curl_blob *first, struct curl_blob *second)
  103. {
  104. if(!first && !second) /* both are NULL */
  105. return TRUE;
  106. if(!first || !second) /* one is NULL */
  107. return FALSE;
  108. if(first->len != second->len) /* different sizes */
  109. return FALSE;
  110. return !memcmp(first->data, second->data, first->len); /* same data */
  111. }
  112. bool
  113. Curl_ssl_config_matches(struct ssl_primary_config *data,
  114. struct ssl_primary_config *needle)
  115. {
  116. if((data->version == needle->version) &&
  117. (data->version_max == needle->version_max) &&
  118. (data->verifypeer == needle->verifypeer) &&
  119. (data->verifyhost == needle->verifyhost) &&
  120. (data->verifystatus == needle->verifystatus) &&
  121. blobcmp(data->cert_blob, needle->cert_blob) &&
  122. blobcmp(data->ca_info_blob, needle->ca_info_blob) &&
  123. blobcmp(data->issuercert_blob, needle->issuercert_blob) &&
  124. Curl_safecmp(data->CApath, needle->CApath) &&
  125. Curl_safecmp(data->CAfile, needle->CAfile) &&
  126. Curl_safecmp(data->issuercert, needle->issuercert) &&
  127. Curl_safecmp(data->clientcert, needle->clientcert) &&
  128. Curl_safecmp(data->random_file, needle->random_file) &&
  129. Curl_safecmp(data->egdsocket, needle->egdsocket) &&
  130. Curl_safe_strcasecompare(data->cipher_list, needle->cipher_list) &&
  131. Curl_safe_strcasecompare(data->cipher_list13, needle->cipher_list13) &&
  132. Curl_safe_strcasecompare(data->curves, needle->curves) &&
  133. Curl_safe_strcasecompare(data->pinned_key, needle->pinned_key))
  134. return TRUE;
  135. return FALSE;
  136. }
  137. bool
  138. Curl_clone_primary_ssl_config(struct ssl_primary_config *source,
  139. struct ssl_primary_config *dest)
  140. {
  141. dest->version = source->version;
  142. dest->version_max = source->version_max;
  143. dest->verifypeer = source->verifypeer;
  144. dest->verifyhost = source->verifyhost;
  145. dest->verifystatus = source->verifystatus;
  146. dest->sessionid = source->sessionid;
  147. CLONE_BLOB(cert_blob);
  148. CLONE_BLOB(ca_info_blob);
  149. CLONE_BLOB(issuercert_blob);
  150. CLONE_STRING(CApath);
  151. CLONE_STRING(CAfile);
  152. CLONE_STRING(issuercert);
  153. CLONE_STRING(clientcert);
  154. CLONE_STRING(random_file);
  155. CLONE_STRING(egdsocket);
  156. CLONE_STRING(cipher_list);
  157. CLONE_STRING(cipher_list13);
  158. CLONE_STRING(pinned_key);
  159. CLONE_STRING(curves);
  160. return TRUE;
  161. }
  162. void Curl_free_primary_ssl_config(struct ssl_primary_config *sslc)
  163. {
  164. Curl_safefree(sslc->CApath);
  165. Curl_safefree(sslc->CAfile);
  166. Curl_safefree(sslc->issuercert);
  167. Curl_safefree(sslc->clientcert);
  168. Curl_safefree(sslc->random_file);
  169. Curl_safefree(sslc->egdsocket);
  170. Curl_safefree(sslc->cipher_list);
  171. Curl_safefree(sslc->cipher_list13);
  172. Curl_safefree(sslc->pinned_key);
  173. Curl_safefree(sslc->cert_blob);
  174. Curl_safefree(sslc->ca_info_blob);
  175. Curl_safefree(sslc->issuercert_blob);
  176. Curl_safefree(sslc->curves);
  177. }
  178. #ifdef USE_SSL
  179. static int multissl_setup(const struct Curl_ssl *backend);
  180. #endif
  181. int Curl_ssl_backend(void)
  182. {
  183. #ifdef USE_SSL
  184. multissl_setup(NULL);
  185. return Curl_ssl->info.id;
  186. #else
  187. return (int)CURLSSLBACKEND_NONE;
  188. #endif
  189. }
  190. #ifdef USE_SSL
  191. /* "global" init done? */
  192. static bool init_ssl = FALSE;
  193. /**
  194. * Global SSL init
  195. *
  196. * @retval 0 error initializing SSL
  197. * @retval 1 SSL initialized successfully
  198. */
  199. int Curl_ssl_init(void)
  200. {
  201. /* make sure this is only done once */
  202. if(init_ssl)
  203. return 1;
  204. init_ssl = TRUE; /* never again */
  205. return Curl_ssl->init();
  206. }
  207. #if defined(CURL_WITH_MULTI_SSL)
  208. static const struct Curl_ssl Curl_ssl_multi;
  209. #endif
  210. /* Global cleanup */
  211. void Curl_ssl_cleanup(void)
  212. {
  213. if(init_ssl) {
  214. /* only cleanup if we did a previous init */
  215. Curl_ssl->cleanup();
  216. #if defined(CURL_WITH_MULTI_SSL)
  217. Curl_ssl = &Curl_ssl_multi;
  218. #endif
  219. init_ssl = FALSE;
  220. }
  221. }
  222. static bool ssl_prefs_check(struct Curl_easy *data)
  223. {
  224. /* check for CURLOPT_SSLVERSION invalid parameter value */
  225. const long sslver = data->set.ssl.primary.version;
  226. if((sslver < 0) || (sslver >= CURL_SSLVERSION_LAST)) {
  227. failf(data, "Unrecognized parameter value passed via CURLOPT_SSLVERSION");
  228. return FALSE;
  229. }
  230. switch(data->set.ssl.primary.version_max) {
  231. case CURL_SSLVERSION_MAX_NONE:
  232. case CURL_SSLVERSION_MAX_DEFAULT:
  233. break;
  234. default:
  235. if((data->set.ssl.primary.version_max >> 16) < sslver) {
  236. failf(data, "CURL_SSLVERSION_MAX incompatible with CURL_SSLVERSION");
  237. return FALSE;
  238. }
  239. }
  240. return TRUE;
  241. }
  242. #ifndef CURL_DISABLE_PROXY
  243. static CURLcode
  244. ssl_connect_init_proxy(struct connectdata *conn, int sockindex)
  245. {
  246. DEBUGASSERT(conn->bits.proxy_ssl_connected[sockindex]);
  247. if(ssl_connection_complete == conn->ssl[sockindex].state &&
  248. !conn->proxy_ssl[sockindex].use) {
  249. struct ssl_backend_data *pbdata;
  250. if(!(Curl_ssl->supports & SSLSUPP_HTTPS_PROXY))
  251. return CURLE_NOT_BUILT_IN;
  252. /* The pointers to the ssl backend data, which is opaque here, are swapped
  253. rather than move the contents. */
  254. pbdata = conn->proxy_ssl[sockindex].backend;
  255. conn->proxy_ssl[sockindex] = conn->ssl[sockindex];
  256. DEBUGASSERT(pbdata != NULL);
  257. memset(&conn->ssl[sockindex], 0, sizeof(conn->ssl[sockindex]));
  258. memset(pbdata, 0, Curl_ssl->sizeof_ssl_backend_data);
  259. conn->ssl[sockindex].backend = pbdata;
  260. }
  261. return CURLE_OK;
  262. }
  263. #endif
  264. CURLcode
  265. Curl_ssl_connect(struct Curl_easy *data, struct connectdata *conn,
  266. int sockindex)
  267. {
  268. CURLcode result;
  269. #ifndef CURL_DISABLE_PROXY
  270. if(conn->bits.proxy_ssl_connected[sockindex]) {
  271. result = ssl_connect_init_proxy(conn, sockindex);
  272. if(result)
  273. return result;
  274. }
  275. #endif
  276. if(!ssl_prefs_check(data))
  277. return CURLE_SSL_CONNECT_ERROR;
  278. /* mark this is being ssl-enabled from here on. */
  279. conn->ssl[sockindex].use = TRUE;
  280. conn->ssl[sockindex].state = ssl_connection_negotiating;
  281. result = Curl_ssl->connect_blocking(data, conn, sockindex);
  282. if(!result)
  283. Curl_pgrsTime(data, TIMER_APPCONNECT); /* SSL is connected */
  284. else
  285. conn->ssl[sockindex].use = FALSE;
  286. return result;
  287. }
  288. CURLcode
  289. Curl_ssl_connect_nonblocking(struct Curl_easy *data, struct connectdata *conn,
  290. bool isproxy, int sockindex, bool *done)
  291. {
  292. CURLcode result;
  293. #ifndef CURL_DISABLE_PROXY
  294. if(conn->bits.proxy_ssl_connected[sockindex]) {
  295. result = ssl_connect_init_proxy(conn, sockindex);
  296. if(result)
  297. return result;
  298. }
  299. #endif
  300. if(!ssl_prefs_check(data))
  301. return CURLE_SSL_CONNECT_ERROR;
  302. /* mark this is being ssl requested from here on. */
  303. conn->ssl[sockindex].use = TRUE;
  304. result = Curl_ssl->connect_nonblocking(data, conn, sockindex, done);
  305. if(result)
  306. conn->ssl[sockindex].use = FALSE;
  307. else if(*done && !isproxy)
  308. Curl_pgrsTime(data, TIMER_APPCONNECT); /* SSL is connected */
  309. return result;
  310. }
  311. /*
  312. * Lock shared SSL session data
  313. */
  314. void Curl_ssl_sessionid_lock(struct Curl_easy *data)
  315. {
  316. if(SSLSESSION_SHARED(data))
  317. Curl_share_lock(data, CURL_LOCK_DATA_SSL_SESSION, CURL_LOCK_ACCESS_SINGLE);
  318. }
  319. /*
  320. * Unlock shared SSL session data
  321. */
  322. void Curl_ssl_sessionid_unlock(struct Curl_easy *data)
  323. {
  324. if(SSLSESSION_SHARED(data))
  325. Curl_share_unlock(data, CURL_LOCK_DATA_SSL_SESSION);
  326. }
  327. /*
  328. * Check if there's a session ID for the given connection in the cache, and if
  329. * there's one suitable, it is provided. Returns TRUE when no entry matched.
  330. */
  331. bool Curl_ssl_getsessionid(struct Curl_easy *data,
  332. struct connectdata *conn,
  333. const bool isProxy,
  334. void **ssl_sessionid,
  335. size_t *idsize, /* set 0 if unknown */
  336. int sockindex)
  337. {
  338. struct Curl_ssl_session *check;
  339. size_t i;
  340. long *general_age;
  341. bool no_match = TRUE;
  342. #ifndef CURL_DISABLE_PROXY
  343. struct ssl_primary_config * const ssl_config = isProxy ?
  344. &conn->proxy_ssl_config :
  345. &conn->ssl_config;
  346. const char * const name = isProxy ?
  347. conn->http_proxy.host.name : conn->host.name;
  348. int port = isProxy ? (int)conn->port : conn->remote_port;
  349. #else
  350. /* no proxy support */
  351. struct ssl_primary_config * const ssl_config = &conn->ssl_config;
  352. const char * const name = conn->host.name;
  353. int port = conn->remote_port;
  354. #endif
  355. (void)sockindex;
  356. *ssl_sessionid = NULL;
  357. #ifdef CURL_DISABLE_PROXY
  358. if(isProxy)
  359. return TRUE;
  360. #endif
  361. DEBUGASSERT(SSL_SET_OPTION(primary.sessionid));
  362. if(!SSL_SET_OPTION(primary.sessionid) || !data->state.session)
  363. /* session ID re-use is disabled or the session cache has not been
  364. setup */
  365. return TRUE;
  366. /* Lock if shared */
  367. if(SSLSESSION_SHARED(data))
  368. general_age = &data->share->sessionage;
  369. else
  370. general_age = &data->state.sessionage;
  371. for(i = 0; i < data->set.general_ssl.max_ssl_sessions; i++) {
  372. check = &data->state.session[i];
  373. if(!check->sessionid)
  374. /* not session ID means blank entry */
  375. continue;
  376. if(strcasecompare(name, check->name) &&
  377. ((!conn->bits.conn_to_host && !check->conn_to_host) ||
  378. (conn->bits.conn_to_host && check->conn_to_host &&
  379. strcasecompare(conn->conn_to_host.name, check->conn_to_host))) &&
  380. ((!conn->bits.conn_to_port && check->conn_to_port == -1) ||
  381. (conn->bits.conn_to_port && check->conn_to_port != -1 &&
  382. conn->conn_to_port == check->conn_to_port)) &&
  383. (port == check->remote_port) &&
  384. strcasecompare(conn->handler->scheme, check->scheme) &&
  385. Curl_ssl_config_matches(ssl_config, &check->ssl_config)) {
  386. /* yes, we have a session ID! */
  387. (*general_age)++; /* increase general age */
  388. check->age = *general_age; /* set this as used in this age */
  389. *ssl_sessionid = check->sessionid;
  390. if(idsize)
  391. *idsize = check->idsize;
  392. no_match = FALSE;
  393. break;
  394. }
  395. }
  396. DEBUGF(infof(data, "%s Session ID in cache for %s %s://%s:%d",
  397. no_match? "Didn't find": "Found",
  398. isProxy ? "proxy" : "host",
  399. conn->handler->scheme, name, port));
  400. return no_match;
  401. }
  402. /*
  403. * Kill a single session ID entry in the cache.
  404. */
  405. void Curl_ssl_kill_session(struct Curl_ssl_session *session)
  406. {
  407. if(session->sessionid) {
  408. /* defensive check */
  409. /* free the ID the SSL-layer specific way */
  410. Curl_ssl->session_free(session->sessionid);
  411. session->sessionid = NULL;
  412. session->age = 0; /* fresh */
  413. Curl_free_primary_ssl_config(&session->ssl_config);
  414. Curl_safefree(session->name);
  415. Curl_safefree(session->conn_to_host);
  416. }
  417. }
  418. /*
  419. * Delete the given session ID from the cache.
  420. */
  421. void Curl_ssl_delsessionid(struct Curl_easy *data, void *ssl_sessionid)
  422. {
  423. size_t i;
  424. for(i = 0; i < data->set.general_ssl.max_ssl_sessions; i++) {
  425. struct Curl_ssl_session *check = &data->state.session[i];
  426. if(check->sessionid == ssl_sessionid) {
  427. Curl_ssl_kill_session(check);
  428. break;
  429. }
  430. }
  431. }
  432. /*
  433. * Store session id in the session cache. The ID passed on to this function
  434. * must already have been extracted and allocated the proper way for the SSL
  435. * layer. Curl_XXXX_session_free() will be called to free/kill the session ID
  436. * later on.
  437. */
  438. CURLcode Curl_ssl_addsessionid(struct Curl_easy *data,
  439. struct connectdata *conn,
  440. const bool isProxy,
  441. void *ssl_sessionid,
  442. size_t idsize,
  443. int sockindex,
  444. bool *added)
  445. {
  446. size_t i;
  447. struct Curl_ssl_session *store;
  448. long oldest_age;
  449. char *clone_host;
  450. char *clone_conn_to_host;
  451. int conn_to_port;
  452. long *general_age;
  453. #ifndef CURL_DISABLE_PROXY
  454. struct ssl_primary_config * const ssl_config = isProxy ?
  455. &conn->proxy_ssl_config :
  456. &conn->ssl_config;
  457. const char *hostname = isProxy ? conn->http_proxy.host.name :
  458. conn->host.name;
  459. #else
  460. struct ssl_primary_config * const ssl_config = &conn->ssl_config;
  461. const char *hostname = conn->host.name;
  462. #endif
  463. (void)sockindex;
  464. if(added)
  465. *added = FALSE;
  466. if(!data->state.session)
  467. return CURLE_OK;
  468. store = &data->state.session[0];
  469. oldest_age = data->state.session[0].age; /* zero if unused */
  470. DEBUGASSERT(SSL_SET_OPTION(primary.sessionid));
  471. clone_host = strdup(hostname);
  472. if(!clone_host)
  473. return CURLE_OUT_OF_MEMORY; /* bail out */
  474. if(conn->bits.conn_to_host) {
  475. clone_conn_to_host = strdup(conn->conn_to_host.name);
  476. if(!clone_conn_to_host) {
  477. free(clone_host);
  478. return CURLE_OUT_OF_MEMORY; /* bail out */
  479. }
  480. }
  481. else
  482. clone_conn_to_host = NULL;
  483. if(conn->bits.conn_to_port)
  484. conn_to_port = conn->conn_to_port;
  485. else
  486. conn_to_port = -1;
  487. /* Now we should add the session ID and the host name to the cache, (remove
  488. the oldest if necessary) */
  489. /* If using shared SSL session, lock! */
  490. if(SSLSESSION_SHARED(data)) {
  491. general_age = &data->share->sessionage;
  492. }
  493. else {
  494. general_age = &data->state.sessionage;
  495. }
  496. /* find an empty slot for us, or find the oldest */
  497. for(i = 1; (i < data->set.general_ssl.max_ssl_sessions) &&
  498. data->state.session[i].sessionid; i++) {
  499. if(data->state.session[i].age < oldest_age) {
  500. oldest_age = data->state.session[i].age;
  501. store = &data->state.session[i];
  502. }
  503. }
  504. if(i == data->set.general_ssl.max_ssl_sessions)
  505. /* cache is full, we must "kill" the oldest entry! */
  506. Curl_ssl_kill_session(store);
  507. else
  508. store = &data->state.session[i]; /* use this slot */
  509. /* now init the session struct wisely */
  510. store->sessionid = ssl_sessionid;
  511. store->idsize = idsize;
  512. store->age = *general_age; /* set current age */
  513. /* free it if there's one already present */
  514. free(store->name);
  515. free(store->conn_to_host);
  516. store->name = clone_host; /* clone host name */
  517. store->conn_to_host = clone_conn_to_host; /* clone connect to host name */
  518. store->conn_to_port = conn_to_port; /* connect to port number */
  519. /* port number */
  520. store->remote_port = isProxy ? (int)conn->port : conn->remote_port;
  521. store->scheme = conn->handler->scheme;
  522. if(!Curl_clone_primary_ssl_config(ssl_config, &store->ssl_config)) {
  523. Curl_free_primary_ssl_config(&store->ssl_config);
  524. store->sessionid = NULL; /* let caller free sessionid */
  525. free(clone_host);
  526. free(clone_conn_to_host);
  527. return CURLE_OUT_OF_MEMORY;
  528. }
  529. if(added)
  530. *added = TRUE;
  531. DEBUGF(infof(data, "Added Session ID to cache for %s://%s:%d [%s]",
  532. store->scheme, store->name, store->remote_port,
  533. isProxy ? "PROXY" : "server"));
  534. return CURLE_OK;
  535. }
  536. void Curl_ssl_associate_conn(struct Curl_easy *data,
  537. struct connectdata *conn)
  538. {
  539. if(Curl_ssl->associate_connection) {
  540. Curl_ssl->associate_connection(data, conn, FIRSTSOCKET);
  541. if((conn->sock[SECONDARYSOCKET] != CURL_SOCKET_BAD) &&
  542. conn->bits.sock_accepted)
  543. Curl_ssl->associate_connection(data, conn, SECONDARYSOCKET);
  544. }
  545. }
  546. void Curl_ssl_detach_conn(struct Curl_easy *data,
  547. struct connectdata *conn)
  548. {
  549. if(Curl_ssl->disassociate_connection) {
  550. Curl_ssl->disassociate_connection(data, FIRSTSOCKET);
  551. if((conn->sock[SECONDARYSOCKET] != CURL_SOCKET_BAD) &&
  552. conn->bits.sock_accepted)
  553. Curl_ssl->disassociate_connection(data, SECONDARYSOCKET);
  554. }
  555. }
  556. void Curl_ssl_close_all(struct Curl_easy *data)
  557. {
  558. /* kill the session ID cache if not shared */
  559. if(data->state.session && !SSLSESSION_SHARED(data)) {
  560. size_t i;
  561. for(i = 0; i < data->set.general_ssl.max_ssl_sessions; i++)
  562. /* the single-killer function handles empty table slots */
  563. Curl_ssl_kill_session(&data->state.session[i]);
  564. /* free the cache data */
  565. Curl_safefree(data->state.session);
  566. }
  567. Curl_ssl->close_all(data);
  568. }
  569. int Curl_ssl_getsock(struct connectdata *conn, curl_socket_t *socks)
  570. {
  571. struct ssl_connect_data *connssl = &conn->ssl[FIRSTSOCKET];
  572. if(connssl->connecting_state == ssl_connect_2_writing) {
  573. /* write mode */
  574. socks[0] = conn->sock[FIRSTSOCKET];
  575. return GETSOCK_WRITESOCK(0);
  576. }
  577. if(connssl->connecting_state == ssl_connect_2_reading) {
  578. /* read mode */
  579. socks[0] = conn->sock[FIRSTSOCKET];
  580. return GETSOCK_READSOCK(0);
  581. }
  582. return GETSOCK_BLANK;
  583. }
  584. void Curl_ssl_close(struct Curl_easy *data, struct connectdata *conn,
  585. int sockindex)
  586. {
  587. DEBUGASSERT((sockindex <= 1) && (sockindex >= -1));
  588. Curl_ssl->close_one(data, conn, sockindex);
  589. conn->ssl[sockindex].state = ssl_connection_none;
  590. }
  591. CURLcode Curl_ssl_shutdown(struct Curl_easy *data, struct connectdata *conn,
  592. int sockindex)
  593. {
  594. if(Curl_ssl->shut_down(data, conn, sockindex))
  595. return CURLE_SSL_SHUTDOWN_FAILED;
  596. conn->ssl[sockindex].use = FALSE; /* get back to ordinary socket usage */
  597. conn->ssl[sockindex].state = ssl_connection_none;
  598. conn->recv[sockindex] = Curl_recv_plain;
  599. conn->send[sockindex] = Curl_send_plain;
  600. return CURLE_OK;
  601. }
  602. /* Selects an SSL crypto engine
  603. */
  604. CURLcode Curl_ssl_set_engine(struct Curl_easy *data, const char *engine)
  605. {
  606. return Curl_ssl->set_engine(data, engine);
  607. }
  608. /* Selects the default SSL crypto engine
  609. */
  610. CURLcode Curl_ssl_set_engine_default(struct Curl_easy *data)
  611. {
  612. return Curl_ssl->set_engine_default(data);
  613. }
  614. /* Return list of OpenSSL crypto engine names. */
  615. struct curl_slist *Curl_ssl_engines_list(struct Curl_easy *data)
  616. {
  617. return Curl_ssl->engines_list(data);
  618. }
  619. /*
  620. * This sets up a session ID cache to the specified size. Make sure this code
  621. * is agnostic to what underlying SSL technology we use.
  622. */
  623. CURLcode Curl_ssl_initsessions(struct Curl_easy *data, size_t amount)
  624. {
  625. struct Curl_ssl_session *session;
  626. if(data->state.session)
  627. /* this is just a precaution to prevent multiple inits */
  628. return CURLE_OK;
  629. session = calloc(amount, sizeof(struct Curl_ssl_session));
  630. if(!session)
  631. return CURLE_OUT_OF_MEMORY;
  632. /* store the info in the SSL section */
  633. data->set.general_ssl.max_ssl_sessions = amount;
  634. data->state.session = session;
  635. data->state.sessionage = 1; /* this is brand new */
  636. return CURLE_OK;
  637. }
  638. static size_t multissl_version(char *buffer, size_t size);
  639. void Curl_ssl_version(char *buffer, size_t size)
  640. {
  641. #ifdef CURL_WITH_MULTI_SSL
  642. (void)multissl_version(buffer, size);
  643. #else
  644. (void)Curl_ssl->version(buffer, size);
  645. #endif
  646. }
  647. /*
  648. * This function tries to determine connection status.
  649. *
  650. * Return codes:
  651. * 1 means the connection is still in place
  652. * 0 means the connection has been closed
  653. * -1 means the connection status is unknown
  654. */
  655. int Curl_ssl_check_cxn(struct connectdata *conn)
  656. {
  657. return Curl_ssl->check_cxn(conn);
  658. }
  659. bool Curl_ssl_data_pending(const struct connectdata *conn,
  660. int connindex)
  661. {
  662. return Curl_ssl->data_pending(conn, connindex);
  663. }
  664. void Curl_ssl_free_certinfo(struct Curl_easy *data)
  665. {
  666. struct curl_certinfo *ci = &data->info.certs;
  667. if(ci->num_of_certs) {
  668. /* free all individual lists used */
  669. int i;
  670. for(i = 0; i<ci->num_of_certs; i++) {
  671. curl_slist_free_all(ci->certinfo[i]);
  672. ci->certinfo[i] = NULL;
  673. }
  674. free(ci->certinfo); /* free the actual array too */
  675. ci->certinfo = NULL;
  676. ci->num_of_certs = 0;
  677. }
  678. }
  679. CURLcode Curl_ssl_init_certinfo(struct Curl_easy *data, int num)
  680. {
  681. struct curl_certinfo *ci = &data->info.certs;
  682. struct curl_slist **table;
  683. /* Free any previous certificate information structures */
  684. Curl_ssl_free_certinfo(data);
  685. /* Allocate the required certificate information structures */
  686. table = calloc((size_t) num, sizeof(struct curl_slist *));
  687. if(!table)
  688. return CURLE_OUT_OF_MEMORY;
  689. ci->num_of_certs = num;
  690. ci->certinfo = table;
  691. return CURLE_OK;
  692. }
  693. /*
  694. * 'value' is NOT a null-terminated string
  695. */
  696. CURLcode Curl_ssl_push_certinfo_len(struct Curl_easy *data,
  697. int certnum,
  698. const char *label,
  699. const char *value,
  700. size_t valuelen)
  701. {
  702. struct curl_certinfo *ci = &data->info.certs;
  703. char *output;
  704. struct curl_slist *nl;
  705. CURLcode result = CURLE_OK;
  706. size_t labellen = strlen(label);
  707. size_t outlen = labellen + 1 + valuelen + 1; /* label:value\0 */
  708. output = malloc(outlen);
  709. if(!output)
  710. return CURLE_OUT_OF_MEMORY;
  711. /* sprintf the label and colon */
  712. msnprintf(output, outlen, "%s:", label);
  713. /* memcpy the value (it might not be null-terminated) */
  714. memcpy(&output[labellen + 1], value, valuelen);
  715. /* null-terminate the output */
  716. output[labellen + 1 + valuelen] = 0;
  717. nl = Curl_slist_append_nodup(ci->certinfo[certnum], output);
  718. if(!nl) {
  719. free(output);
  720. curl_slist_free_all(ci->certinfo[certnum]);
  721. result = CURLE_OUT_OF_MEMORY;
  722. }
  723. ci->certinfo[certnum] = nl;
  724. return result;
  725. }
  726. /*
  727. * This is a convenience function for push_certinfo_len that takes a zero
  728. * terminated value.
  729. */
  730. CURLcode Curl_ssl_push_certinfo(struct Curl_easy *data,
  731. int certnum,
  732. const char *label,
  733. const char *value)
  734. {
  735. size_t valuelen = strlen(value);
  736. return Curl_ssl_push_certinfo_len(data, certnum, label, value, valuelen);
  737. }
  738. CURLcode Curl_ssl_random(struct Curl_easy *data,
  739. unsigned char *entropy,
  740. size_t length)
  741. {
  742. return Curl_ssl->random(data, entropy, length);
  743. }
  744. /*
  745. * Curl_ssl_snihost() converts the input host name to a suitable SNI name put
  746. * in data->state.buffer. Returns a pointer to the name (or NULL if a problem)
  747. * and stores the new length in 'olen'.
  748. *
  749. * SNI fields must not have any trailing dot and while RFC 6066 section 3 says
  750. * the SNI field is case insensitive, browsers always send the data lowercase
  751. * and subsequently there are numerous servers out there that don't work
  752. * unless the name is lowercased.
  753. */
  754. char *Curl_ssl_snihost(struct Curl_easy *data, const char *host, size_t *olen)
  755. {
  756. size_t len = strlen(host);
  757. if(len && (host[len-1] == '.'))
  758. len--;
  759. if((long)len >= data->set.buffer_size)
  760. return NULL;
  761. Curl_strntolower(data->state.buffer, host, len);
  762. data->state.buffer[len] = 0;
  763. if(olen)
  764. *olen = len;
  765. return data->state.buffer;
  766. }
  767. /*
  768. * Public key pem to der conversion
  769. */
  770. static CURLcode pubkey_pem_to_der(const char *pem,
  771. unsigned char **der, size_t *der_len)
  772. {
  773. char *stripped_pem, *begin_pos, *end_pos;
  774. size_t pem_count, stripped_pem_count = 0, pem_len;
  775. CURLcode result;
  776. /* if no pem, exit. */
  777. if(!pem)
  778. return CURLE_BAD_CONTENT_ENCODING;
  779. begin_pos = strstr(pem, "-----BEGIN PUBLIC KEY-----");
  780. if(!begin_pos)
  781. return CURLE_BAD_CONTENT_ENCODING;
  782. pem_count = begin_pos - pem;
  783. /* Invalid if not at beginning AND not directly following \n */
  784. if(0 != pem_count && '\n' != pem[pem_count - 1])
  785. return CURLE_BAD_CONTENT_ENCODING;
  786. /* 26 is length of "-----BEGIN PUBLIC KEY-----" */
  787. pem_count += 26;
  788. /* Invalid if not directly following \n */
  789. end_pos = strstr(pem + pem_count, "\n-----END PUBLIC KEY-----");
  790. if(!end_pos)
  791. return CURLE_BAD_CONTENT_ENCODING;
  792. pem_len = end_pos - pem;
  793. stripped_pem = malloc(pem_len - pem_count + 1);
  794. if(!stripped_pem)
  795. return CURLE_OUT_OF_MEMORY;
  796. /*
  797. * Here we loop through the pem array one character at a time between the
  798. * correct indices, and place each character that is not '\n' or '\r'
  799. * into the stripped_pem array, which should represent the raw base64 string
  800. */
  801. while(pem_count < pem_len) {
  802. if('\n' != pem[pem_count] && '\r' != pem[pem_count])
  803. stripped_pem[stripped_pem_count++] = pem[pem_count];
  804. ++pem_count;
  805. }
  806. /* Place the null terminator in the correct place */
  807. stripped_pem[stripped_pem_count] = '\0';
  808. result = Curl_base64_decode(stripped_pem, der, der_len);
  809. Curl_safefree(stripped_pem);
  810. return result;
  811. }
  812. /*
  813. * Generic pinned public key check.
  814. */
  815. CURLcode Curl_pin_peer_pubkey(struct Curl_easy *data,
  816. const char *pinnedpubkey,
  817. const unsigned char *pubkey, size_t pubkeylen)
  818. {
  819. FILE *fp;
  820. unsigned char *buf = NULL, *pem_ptr = NULL;
  821. CURLcode result = CURLE_SSL_PINNEDPUBKEYNOTMATCH;
  822. /* if a path wasn't specified, don't pin */
  823. if(!pinnedpubkey)
  824. return CURLE_OK;
  825. if(!pubkey || !pubkeylen)
  826. return result;
  827. /* only do this if pinnedpubkey starts with "sha256//", length 8 */
  828. if(strncmp(pinnedpubkey, "sha256//", 8) == 0) {
  829. CURLcode encode;
  830. size_t encodedlen, pinkeylen;
  831. char *encoded, *pinkeycopy, *begin_pos, *end_pos;
  832. unsigned char *sha256sumdigest;
  833. if(!Curl_ssl->sha256sum) {
  834. /* without sha256 support, this cannot match */
  835. return result;
  836. }
  837. /* compute sha256sum of public key */
  838. sha256sumdigest = malloc(CURL_SHA256_DIGEST_LENGTH);
  839. if(!sha256sumdigest)
  840. return CURLE_OUT_OF_MEMORY;
  841. encode = Curl_ssl->sha256sum(pubkey, pubkeylen,
  842. sha256sumdigest, CURL_SHA256_DIGEST_LENGTH);
  843. if(encode != CURLE_OK)
  844. return encode;
  845. encode = Curl_base64_encode((char *)sha256sumdigest,
  846. CURL_SHA256_DIGEST_LENGTH, &encoded,
  847. &encodedlen);
  848. Curl_safefree(sha256sumdigest);
  849. if(encode)
  850. return encode;
  851. infof(data, " public key hash: sha256//%s", encoded);
  852. /* it starts with sha256//, copy so we can modify it */
  853. pinkeylen = strlen(pinnedpubkey) + 1;
  854. pinkeycopy = malloc(pinkeylen);
  855. if(!pinkeycopy) {
  856. Curl_safefree(encoded);
  857. return CURLE_OUT_OF_MEMORY;
  858. }
  859. memcpy(pinkeycopy, pinnedpubkey, pinkeylen);
  860. /* point begin_pos to the copy, and start extracting keys */
  861. begin_pos = pinkeycopy;
  862. do {
  863. end_pos = strstr(begin_pos, ";sha256//");
  864. /*
  865. * if there is an end_pos, null terminate,
  866. * otherwise it'll go to the end of the original string
  867. */
  868. if(end_pos)
  869. end_pos[0] = '\0';
  870. /* compare base64 sha256 digests, 8 is the length of "sha256//" */
  871. if(encodedlen == strlen(begin_pos + 8) &&
  872. !memcmp(encoded, begin_pos + 8, encodedlen)) {
  873. result = CURLE_OK;
  874. break;
  875. }
  876. /*
  877. * change back the null-terminator we changed earlier,
  878. * and look for next begin
  879. */
  880. if(end_pos) {
  881. end_pos[0] = ';';
  882. begin_pos = strstr(end_pos, "sha256//");
  883. }
  884. } while(end_pos && begin_pos);
  885. Curl_safefree(encoded);
  886. Curl_safefree(pinkeycopy);
  887. return result;
  888. }
  889. fp = fopen(pinnedpubkey, "rb");
  890. if(!fp)
  891. return result;
  892. do {
  893. long filesize;
  894. size_t size, pem_len;
  895. CURLcode pem_read;
  896. /* Determine the file's size */
  897. if(fseek(fp, 0, SEEK_END))
  898. break;
  899. filesize = ftell(fp);
  900. if(fseek(fp, 0, SEEK_SET))
  901. break;
  902. if(filesize < 0 || filesize > MAX_PINNED_PUBKEY_SIZE)
  903. break;
  904. /*
  905. * if the size of our certificate is bigger than the file
  906. * size then it can't match
  907. */
  908. size = curlx_sotouz((curl_off_t) filesize);
  909. if(pubkeylen > size)
  910. break;
  911. /*
  912. * Allocate buffer for the pinned key
  913. * With 1 additional byte for null terminator in case of PEM key
  914. */
  915. buf = malloc(size + 1);
  916. if(!buf)
  917. break;
  918. /* Returns number of elements read, which should be 1 */
  919. if((int) fread(buf, size, 1, fp) != 1)
  920. break;
  921. /* If the sizes are the same, it can't be base64 encoded, must be der */
  922. if(pubkeylen == size) {
  923. if(!memcmp(pubkey, buf, pubkeylen))
  924. result = CURLE_OK;
  925. break;
  926. }
  927. /*
  928. * Otherwise we will assume it's PEM and try to decode it
  929. * after placing null terminator
  930. */
  931. buf[size] = '\0';
  932. pem_read = pubkey_pem_to_der((const char *)buf, &pem_ptr, &pem_len);
  933. /* if it wasn't read successfully, exit */
  934. if(pem_read)
  935. break;
  936. /*
  937. * if the size of our certificate doesn't match the size of
  938. * the decoded file, they can't be the same, otherwise compare
  939. */
  940. if(pubkeylen == pem_len && !memcmp(pubkey, pem_ptr, pubkeylen))
  941. result = CURLE_OK;
  942. } while(0);
  943. Curl_safefree(buf);
  944. Curl_safefree(pem_ptr);
  945. fclose(fp);
  946. return result;
  947. }
  948. /*
  949. * Check whether the SSL backend supports the status_request extension.
  950. */
  951. bool Curl_ssl_cert_status_request(void)
  952. {
  953. return Curl_ssl->cert_status_request();
  954. }
  955. /*
  956. * Check whether the SSL backend supports false start.
  957. */
  958. bool Curl_ssl_false_start(void)
  959. {
  960. return Curl_ssl->false_start();
  961. }
  962. /*
  963. * Check whether the SSL backend supports setting TLS 1.3 cipher suites
  964. */
  965. bool Curl_ssl_tls13_ciphersuites(void)
  966. {
  967. return Curl_ssl->supports & SSLSUPP_TLS13_CIPHERSUITES;
  968. }
  969. /*
  970. * Default implementations for unsupported functions.
  971. */
  972. int Curl_none_init(void)
  973. {
  974. return 1;
  975. }
  976. void Curl_none_cleanup(void)
  977. { }
  978. int Curl_none_shutdown(struct Curl_easy *data UNUSED_PARAM,
  979. struct connectdata *conn UNUSED_PARAM,
  980. int sockindex UNUSED_PARAM)
  981. {
  982. (void)data;
  983. (void)conn;
  984. (void)sockindex;
  985. return 0;
  986. }
  987. int Curl_none_check_cxn(struct connectdata *conn UNUSED_PARAM)
  988. {
  989. (void)conn;
  990. return -1;
  991. }
  992. CURLcode Curl_none_random(struct Curl_easy *data UNUSED_PARAM,
  993. unsigned char *entropy UNUSED_PARAM,
  994. size_t length UNUSED_PARAM)
  995. {
  996. (void)data;
  997. (void)entropy;
  998. (void)length;
  999. return CURLE_NOT_BUILT_IN;
  1000. }
  1001. void Curl_none_close_all(struct Curl_easy *data UNUSED_PARAM)
  1002. {
  1003. (void)data;
  1004. }
  1005. void Curl_none_session_free(void *ptr UNUSED_PARAM)
  1006. {
  1007. (void)ptr;
  1008. }
  1009. bool Curl_none_data_pending(const struct connectdata *conn UNUSED_PARAM,
  1010. int connindex UNUSED_PARAM)
  1011. {
  1012. (void)conn;
  1013. (void)connindex;
  1014. return 0;
  1015. }
  1016. bool Curl_none_cert_status_request(void)
  1017. {
  1018. return FALSE;
  1019. }
  1020. CURLcode Curl_none_set_engine(struct Curl_easy *data UNUSED_PARAM,
  1021. const char *engine UNUSED_PARAM)
  1022. {
  1023. (void)data;
  1024. (void)engine;
  1025. return CURLE_NOT_BUILT_IN;
  1026. }
  1027. CURLcode Curl_none_set_engine_default(struct Curl_easy *data UNUSED_PARAM)
  1028. {
  1029. (void)data;
  1030. return CURLE_NOT_BUILT_IN;
  1031. }
  1032. struct curl_slist *Curl_none_engines_list(struct Curl_easy *data UNUSED_PARAM)
  1033. {
  1034. (void)data;
  1035. return (struct curl_slist *)NULL;
  1036. }
  1037. bool Curl_none_false_start(void)
  1038. {
  1039. return FALSE;
  1040. }
  1041. static int multissl_init(void)
  1042. {
  1043. if(multissl_setup(NULL))
  1044. return 1;
  1045. return Curl_ssl->init();
  1046. }
  1047. static CURLcode multissl_connect(struct Curl_easy *data,
  1048. struct connectdata *conn, int sockindex)
  1049. {
  1050. if(multissl_setup(NULL))
  1051. return CURLE_FAILED_INIT;
  1052. return Curl_ssl->connect_blocking(data, conn, sockindex);
  1053. }
  1054. static CURLcode multissl_connect_nonblocking(struct Curl_easy *data,
  1055. struct connectdata *conn,
  1056. int sockindex, bool *done)
  1057. {
  1058. if(multissl_setup(NULL))
  1059. return CURLE_FAILED_INIT;
  1060. return Curl_ssl->connect_nonblocking(data, conn, sockindex, done);
  1061. }
  1062. static int multissl_getsock(struct connectdata *conn, curl_socket_t *socks)
  1063. {
  1064. if(multissl_setup(NULL))
  1065. return 0;
  1066. return Curl_ssl->getsock(conn, socks);
  1067. }
  1068. static void *multissl_get_internals(struct ssl_connect_data *connssl,
  1069. CURLINFO info)
  1070. {
  1071. if(multissl_setup(NULL))
  1072. return NULL;
  1073. return Curl_ssl->get_internals(connssl, info);
  1074. }
  1075. static void multissl_close(struct Curl_easy *data, struct connectdata *conn,
  1076. int sockindex)
  1077. {
  1078. if(multissl_setup(NULL))
  1079. return;
  1080. Curl_ssl->close_one(data, conn, sockindex);
  1081. }
  1082. static const struct Curl_ssl Curl_ssl_multi = {
  1083. { CURLSSLBACKEND_NONE, "multi" }, /* info */
  1084. 0, /* supports nothing */
  1085. (size_t)-1, /* something insanely large to be on the safe side */
  1086. multissl_init, /* init */
  1087. Curl_none_cleanup, /* cleanup */
  1088. multissl_version, /* version */
  1089. Curl_none_check_cxn, /* check_cxn */
  1090. Curl_none_shutdown, /* shutdown */
  1091. Curl_none_data_pending, /* data_pending */
  1092. Curl_none_random, /* random */
  1093. Curl_none_cert_status_request, /* cert_status_request */
  1094. multissl_connect, /* connect */
  1095. multissl_connect_nonblocking, /* connect_nonblocking */
  1096. multissl_getsock, /* getsock */
  1097. multissl_get_internals, /* get_internals */
  1098. multissl_close, /* close_one */
  1099. Curl_none_close_all, /* close_all */
  1100. Curl_none_session_free, /* session_free */
  1101. Curl_none_set_engine, /* set_engine */
  1102. Curl_none_set_engine_default, /* set_engine_default */
  1103. Curl_none_engines_list, /* engines_list */
  1104. Curl_none_false_start, /* false_start */
  1105. NULL, /* sha256sum */
  1106. NULL, /* associate_connection */
  1107. NULL /* disassociate_connection */
  1108. };
  1109. const struct Curl_ssl *Curl_ssl =
  1110. #if defined(CURL_WITH_MULTI_SSL)
  1111. &Curl_ssl_multi;
  1112. #elif defined(USE_WOLFSSL)
  1113. &Curl_ssl_wolfssl;
  1114. #elif defined(USE_SECTRANSP)
  1115. &Curl_ssl_sectransp;
  1116. #elif defined(USE_GNUTLS)
  1117. &Curl_ssl_gnutls;
  1118. #elif defined(USE_GSKIT)
  1119. &Curl_ssl_gskit;
  1120. #elif defined(USE_MBEDTLS)
  1121. &Curl_ssl_mbedtls;
  1122. #elif defined(USE_NSS)
  1123. &Curl_ssl_nss;
  1124. #elif defined(USE_RUSTLS)
  1125. &Curl_ssl_rustls;
  1126. #elif defined(USE_OPENSSL)
  1127. &Curl_ssl_openssl;
  1128. #elif defined(USE_SCHANNEL)
  1129. &Curl_ssl_schannel;
  1130. #elif defined(USE_BEARSSL)
  1131. &Curl_ssl_bearssl;
  1132. #else
  1133. #error "Missing struct Curl_ssl for selected SSL backend"
  1134. #endif
  1135. static const struct Curl_ssl *available_backends[] = {
  1136. #if defined(USE_WOLFSSL)
  1137. &Curl_ssl_wolfssl,
  1138. #endif
  1139. #if defined(USE_SECTRANSP)
  1140. &Curl_ssl_sectransp,
  1141. #endif
  1142. #if defined(USE_GNUTLS)
  1143. &Curl_ssl_gnutls,
  1144. #endif
  1145. #if defined(USE_GSKIT)
  1146. &Curl_ssl_gskit,
  1147. #endif
  1148. #if defined(USE_MBEDTLS)
  1149. &Curl_ssl_mbedtls,
  1150. #endif
  1151. #if defined(USE_NSS)
  1152. &Curl_ssl_nss,
  1153. #endif
  1154. #if defined(USE_OPENSSL)
  1155. &Curl_ssl_openssl,
  1156. #endif
  1157. #if defined(USE_SCHANNEL)
  1158. &Curl_ssl_schannel,
  1159. #endif
  1160. #if defined(USE_BEARSSL)
  1161. &Curl_ssl_bearssl,
  1162. #endif
  1163. #if defined(USE_RUSTLS)
  1164. &Curl_ssl_rustls,
  1165. #endif
  1166. NULL
  1167. };
  1168. static size_t multissl_version(char *buffer, size_t size)
  1169. {
  1170. static const struct Curl_ssl *selected;
  1171. static char backends[200];
  1172. static size_t backends_len;
  1173. const struct Curl_ssl *current;
  1174. current = Curl_ssl == &Curl_ssl_multi ? available_backends[0] : Curl_ssl;
  1175. if(current != selected) {
  1176. char *p = backends;
  1177. char *end = backends + sizeof(backends);
  1178. int i;
  1179. selected = current;
  1180. backends[0] = '\0';
  1181. for(i = 0; available_backends[i]; ++i) {
  1182. char vb[200];
  1183. bool paren = (selected != available_backends[i]);
  1184. if(available_backends[i]->version(vb, sizeof(vb))) {
  1185. p += msnprintf(p, end - p, "%s%s%s%s", (p != backends ? " " : ""),
  1186. (paren ? "(" : ""), vb, (paren ? ")" : ""));
  1187. }
  1188. }
  1189. backends_len = p - backends;
  1190. }
  1191. if(!size)
  1192. return 0;
  1193. if(size <= backends_len) {
  1194. strncpy(buffer, backends, size - 1);
  1195. buffer[size - 1] = '\0';
  1196. return size - 1;
  1197. }
  1198. strcpy(buffer, backends);
  1199. return backends_len;
  1200. }
  1201. static int multissl_setup(const struct Curl_ssl *backend)
  1202. {
  1203. const char *env;
  1204. char *env_tmp;
  1205. if(Curl_ssl != &Curl_ssl_multi)
  1206. return 1;
  1207. if(backend) {
  1208. Curl_ssl = backend;
  1209. return 0;
  1210. }
  1211. if(!available_backends[0])
  1212. return 1;
  1213. env = env_tmp = curl_getenv("CURL_SSL_BACKEND");
  1214. #ifdef CURL_DEFAULT_SSL_BACKEND
  1215. if(!env)
  1216. env = CURL_DEFAULT_SSL_BACKEND;
  1217. #endif
  1218. if(env) {
  1219. int i;
  1220. for(i = 0; available_backends[i]; i++) {
  1221. if(strcasecompare(env, available_backends[i]->info.name)) {
  1222. Curl_ssl = available_backends[i];
  1223. free(env_tmp);
  1224. return 0;
  1225. }
  1226. }
  1227. }
  1228. /* Fall back to first available backend */
  1229. Curl_ssl = available_backends[0];
  1230. free(env_tmp);
  1231. return 0;
  1232. }
  1233. CURLsslset curl_global_sslset(curl_sslbackend id, const char *name,
  1234. const curl_ssl_backend ***avail)
  1235. {
  1236. int i;
  1237. if(avail)
  1238. *avail = (const curl_ssl_backend **)&available_backends;
  1239. if(Curl_ssl != &Curl_ssl_multi)
  1240. return id == Curl_ssl->info.id ||
  1241. (name && strcasecompare(name, Curl_ssl->info.name)) ?
  1242. CURLSSLSET_OK :
  1243. #if defined(CURL_WITH_MULTI_SSL)
  1244. CURLSSLSET_TOO_LATE;
  1245. #else
  1246. CURLSSLSET_UNKNOWN_BACKEND;
  1247. #endif
  1248. for(i = 0; available_backends[i]; i++) {
  1249. if(available_backends[i]->info.id == id ||
  1250. (name && strcasecompare(available_backends[i]->info.name, name))) {
  1251. multissl_setup(available_backends[i]);
  1252. return CURLSSLSET_OK;
  1253. }
  1254. }
  1255. return CURLSSLSET_UNKNOWN_BACKEND;
  1256. }
  1257. #else /* USE_SSL */
  1258. CURLsslset curl_global_sslset(curl_sslbackend id, const char *name,
  1259. const curl_ssl_backend ***avail)
  1260. {
  1261. (void)id;
  1262. (void)name;
  1263. (void)avail;
  1264. return CURLSSLSET_NO_BACKENDS;
  1265. }
  1266. #endif /* !USE_SSL */