1 | #ifndef HEADER_CURL_VTLS_H |
2 | #define |
3 | /*************************************************************************** |
4 | * _ _ ____ _ |
5 | * Project ___| | | | _ \| | |
6 | * / __| | | | |_) | | |
7 | * | (__| |_| | _ <| |___ |
8 | * \___|\___/|_| \_\_____| |
9 | * |
10 | * Copyright (C) 1998 - 2021, Daniel Stenberg, <daniel@haxx.se>, et al. |
11 | * |
12 | * This software is licensed as described in the file COPYING, which |
13 | * you should have received as part of this distribution. The terms |
14 | * are also available at https://curl.se/docs/copyright.html. |
15 | * |
16 | * You may opt to use, copy, modify, merge, publish, distribute and/or sell |
17 | * copies of the Software, and permit persons to whom the Software is |
18 | * furnished to do so, under the terms of the COPYING file. |
19 | * |
20 | * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY |
21 | * KIND, either express or implied. |
22 | * |
23 | ***************************************************************************/ |
24 | #include "curl_setup.h" |
25 | |
26 | struct connectdata; |
27 | struct ssl_connect_data; |
28 | |
29 | #define SSLSUPP_CA_PATH (1<<0) /* supports CAPATH */ |
30 | #define SSLSUPP_CERTINFO (1<<1) /* supports CURLOPT_CERTINFO */ |
31 | #define SSLSUPP_PINNEDPUBKEY (1<<2) /* supports CURLOPT_PINNEDPUBLICKEY */ |
32 | #define SSLSUPP_SSL_CTX (1<<3) /* supports CURLOPT_SSL_CTX */ |
33 | #define SSLSUPP_HTTPS_PROXY (1<<4) /* supports access via HTTPS proxies */ |
34 | #define SSLSUPP_TLS13_CIPHERSUITES (1<<5) /* supports TLS 1.3 ciphersuites */ |
35 | #define SSLSUPP_CAINFO_BLOB (1<<6) |
36 | |
37 | struct Curl_ssl { |
38 | /* |
39 | * This *must* be the first entry to allow returning the list of available |
40 | * backends in curl_global_sslset(). |
41 | */ |
42 | curl_ssl_backend info; |
43 | unsigned int supports; /* bitfield, see above */ |
44 | size_t sizeof_ssl_backend_data; |
45 | |
46 | int (*init)(void); |
47 | void (*cleanup)(void); |
48 | |
49 | size_t (*version)(char *buffer, size_t size); |
50 | int (*check_cxn)(struct connectdata *cxn); |
51 | int (*shut_down)(struct Curl_easy *data, struct connectdata *conn, |
52 | int sockindex); |
53 | bool (*data_pending)(const struct connectdata *conn, |
54 | int connindex); |
55 | |
56 | /* return 0 if a find random is filled in */ |
57 | CURLcode (*random)(struct Curl_easy *data, unsigned char *entropy, |
58 | size_t length); |
59 | bool (*cert_status_request)(void); |
60 | |
61 | CURLcode (*connect_blocking)(struct Curl_easy *data, |
62 | struct connectdata *conn, int sockindex); |
63 | CURLcode (*connect_nonblocking)(struct Curl_easy *data, |
64 | struct connectdata *conn, int sockindex, |
65 | bool *done); |
66 | |
67 | /* If the SSL backend wants to read or write on this connection during a |
68 | handshake, set socks[0] to the connection's FIRSTSOCKET, and return |
69 | a bitmap indicating read or write with GETSOCK_WRITESOCK(0) or |
70 | GETSOCK_READSOCK(0). Otherwise return GETSOCK_BLANK. |
71 | Mandatory. */ |
72 | int (*getsock)(struct connectdata *conn, curl_socket_t *socks); |
73 | |
74 | void *(*get_internals)(struct ssl_connect_data *connssl, CURLINFO info); |
75 | void (*close_one)(struct Curl_easy *data, struct connectdata *conn, |
76 | int sockindex); |
77 | void (*close_all)(struct Curl_easy *data); |
78 | void (*session_free)(void *ptr); |
79 | |
80 | CURLcode (*set_engine)(struct Curl_easy *data, const char *engine); |
81 | CURLcode (*set_engine_default)(struct Curl_easy *data); |
82 | struct curl_slist *(*engines_list)(struct Curl_easy *data); |
83 | |
84 | bool (*false_start)(void); |
85 | CURLcode (*sha256sum)(const unsigned char *input, size_t inputlen, |
86 | unsigned char *sha256sum, size_t sha256sumlen); |
87 | |
88 | void (*associate_connection)(struct Curl_easy *data, |
89 | struct connectdata *conn, |
90 | int sockindex); |
91 | void (*disassociate_connection)(struct Curl_easy *data, int sockindex); |
92 | }; |
93 | |
94 | #ifdef USE_SSL |
95 | extern const struct Curl_ssl *Curl_ssl; |
96 | #endif |
97 | |
98 | int Curl_none_init(void); |
99 | void Curl_none_cleanup(void); |
100 | int Curl_none_shutdown(struct Curl_easy *data, struct connectdata *conn, |
101 | int sockindex); |
102 | int Curl_none_check_cxn(struct connectdata *conn); |
103 | CURLcode Curl_none_random(struct Curl_easy *data, unsigned char *entropy, |
104 | size_t length); |
105 | void Curl_none_close_all(struct Curl_easy *data); |
106 | void Curl_none_session_free(void *ptr); |
107 | bool Curl_none_data_pending(const struct connectdata *conn, int connindex); |
108 | bool Curl_none_cert_status_request(void); |
109 | CURLcode Curl_none_set_engine(struct Curl_easy *data, const char *engine); |
110 | CURLcode Curl_none_set_engine_default(struct Curl_easy *data); |
111 | struct curl_slist *Curl_none_engines_list(struct Curl_easy *data); |
112 | bool Curl_none_false_start(void); |
113 | bool Curl_ssl_tls13_ciphersuites(void); |
114 | |
115 | #include "openssl.h" /* OpenSSL versions */ |
116 | #include "gtls.h" /* GnuTLS versions */ |
117 | #include "nssg.h" /* NSS versions */ |
118 | #include "gskit.h" /* Global Secure ToolKit versions */ |
119 | #include "wolfssl.h" /* wolfSSL versions */ |
120 | #include "schannel.h" /* Schannel SSPI version */ |
121 | #include "sectransp.h" /* SecureTransport (Darwin) version */ |
122 | #include "mbedtls.h" /* mbedTLS versions */ |
123 | #include "mesalink.h" /* MesaLink versions */ |
124 | #include "bearssl.h" /* BearSSL versions */ |
125 | #include "rustls.h" /* rustls versions */ |
126 | |
127 | #ifndef MAX_PINNED_PUBKEY_SIZE |
128 | #define MAX_PINNED_PUBKEY_SIZE 1048576 /* 1MB */ |
129 | #endif |
130 | |
131 | #ifndef CURL_SHA256_DIGEST_LENGTH |
132 | #define CURL_SHA256_DIGEST_LENGTH 32 /* fixed size */ |
133 | #endif |
134 | |
135 | /* see https://www.iana.org/assignments/tls-extensiontype-values/ */ |
136 | #define ALPN_HTTP_1_1_LENGTH 8 |
137 | #define ALPN_HTTP_1_1 "http/1.1" |
138 | #define ALPN_H2_LENGTH 2 |
139 | #define ALPN_H2 "h2" |
140 | |
141 | /* set of helper macros for the backends to access the correct fields. For the |
142 | proxy or for the remote host - to properly support HTTPS proxy */ |
143 | #ifndef CURL_DISABLE_PROXY |
144 | #define SSL_IS_PROXY() \ |
145 | (CURLPROXY_HTTPS == conn->http_proxy.proxytype && \ |
146 | ssl_connection_complete != \ |
147 | conn->proxy_ssl[conn->sock[SECONDARYSOCKET] == \ |
148 | CURL_SOCKET_BAD ? FIRSTSOCKET : SECONDARYSOCKET].state) |
149 | #define SSL_SET_OPTION(var) \ |
150 | (SSL_IS_PROXY() ? data->set.proxy_ssl.var : data->set.ssl.var) |
151 | #define SSL_SET_OPTION_LVALUE(var) \ |
152 | (*(SSL_IS_PROXY() ? &data->set.proxy_ssl.var : &data->set.ssl.var)) |
153 | #define SSL_CONN_CONFIG(var) \ |
154 | (SSL_IS_PROXY() ? conn->proxy_ssl_config.var : conn->ssl_config.var) |
155 | #define SSL_HOST_NAME() \ |
156 | (SSL_IS_PROXY() ? conn->http_proxy.host.name : conn->host.name) |
157 | #define SSL_HOST_DISPNAME() \ |
158 | (SSL_IS_PROXY() ? conn->http_proxy.host.dispname : conn->host.dispname) |
159 | #define SSL_HOST_PORT() \ |
160 | (SSL_IS_PROXY() ? conn->port : conn->remote_port) |
161 | #define SSL_PINNED_PUB_KEY() (SSL_IS_PROXY() \ |
162 | ? data->set.str[STRING_SSL_PINNEDPUBLICKEY_PROXY] \ |
163 | : data->set.str[STRING_SSL_PINNEDPUBLICKEY]) |
164 | #else |
165 | #define SSL_IS_PROXY() FALSE |
166 | #define SSL_SET_OPTION(var) data->set.ssl.var |
167 | #define SSL_SET_OPTION_LVALUE(var) data->set.ssl.var |
168 | #define SSL_CONN_CONFIG(var) conn->ssl_config.var |
169 | #define SSL_HOST_NAME() conn->host.name |
170 | #define SSL_HOST_DISPNAME() conn->host.dispname |
171 | #define SSL_HOST_PORT() conn->remote_port |
172 | #define SSL_PINNED_PUB_KEY() \ |
173 | data->set.str[STRING_SSL_PINNEDPUBLICKEY] |
174 | #endif |
175 | |
176 | bool Curl_ssl_config_matches(struct ssl_primary_config *data, |
177 | struct ssl_primary_config *needle); |
178 | bool Curl_clone_primary_ssl_config(struct ssl_primary_config *source, |
179 | struct ssl_primary_config *dest); |
180 | void Curl_free_primary_ssl_config(struct ssl_primary_config *sslc); |
181 | /* An implementation of the getsock field of Curl_ssl that relies |
182 | on the ssl_connect_state enum. Asks for read or write depending |
183 | on whether conn->state is ssl_connect_2_reading or |
184 | ssl_connect_2_writing. */ |
185 | int Curl_ssl_getsock(struct connectdata *conn, curl_socket_t *socks); |
186 | |
187 | int Curl_ssl_backend(void); |
188 | |
189 | #ifdef USE_SSL |
190 | int Curl_ssl_init(void); |
191 | void Curl_ssl_cleanup(void); |
192 | CURLcode Curl_ssl_connect(struct Curl_easy *data, struct connectdata *conn, |
193 | int sockindex); |
194 | CURLcode Curl_ssl_connect_nonblocking(struct Curl_easy *data, |
195 | struct connectdata *conn, |
196 | bool isproxy, |
197 | int sockindex, |
198 | bool *done); |
199 | /* tell the SSL stuff to close down all open information regarding |
200 | connections (and thus session ID caching etc) */ |
201 | void Curl_ssl_close_all(struct Curl_easy *data); |
202 | void Curl_ssl_close(struct Curl_easy *data, struct connectdata *conn, |
203 | int sockindex); |
204 | CURLcode Curl_ssl_shutdown(struct Curl_easy *data, struct connectdata *conn, |
205 | int sockindex); |
206 | CURLcode Curl_ssl_set_engine(struct Curl_easy *data, const char *engine); |
207 | /* Sets engine as default for all SSL operations */ |
208 | CURLcode Curl_ssl_set_engine_default(struct Curl_easy *data); |
209 | struct curl_slist *Curl_ssl_engines_list(struct Curl_easy *data); |
210 | |
211 | /* init the SSL session ID cache */ |
212 | CURLcode Curl_ssl_initsessions(struct Curl_easy *, size_t); |
213 | void Curl_ssl_version(char *buffer, size_t size); |
214 | bool Curl_ssl_data_pending(const struct connectdata *conn, |
215 | int connindex); |
216 | int Curl_ssl_check_cxn(struct connectdata *conn); |
217 | |
218 | /* Certificate information list handling. */ |
219 | |
220 | void Curl_ssl_free_certinfo(struct Curl_easy *data); |
221 | CURLcode Curl_ssl_init_certinfo(struct Curl_easy *data, int num); |
222 | CURLcode Curl_ssl_push_certinfo_len(struct Curl_easy *data, int certnum, |
223 | const char *label, const char *value, |
224 | size_t valuelen); |
225 | CURLcode Curl_ssl_push_certinfo(struct Curl_easy *data, int certnum, |
226 | const char *label, const char *value); |
227 | |
228 | /* Functions to be used by SSL library adaptation functions */ |
229 | |
230 | /* Lock session cache mutex. |
231 | * Call this before calling other Curl_ssl_*session* functions |
232 | * Caller should unlock this mutex as soon as possible, as it may block |
233 | * other SSL connection from making progress. |
234 | * The purpose of explicitly locking SSL session cache data is to allow |
235 | * individual SSL engines to manage session lifetime in their specific way. |
236 | */ |
237 | void Curl_ssl_sessionid_lock(struct Curl_easy *data); |
238 | |
239 | /* Unlock session cache mutex */ |
240 | void Curl_ssl_sessionid_unlock(struct Curl_easy *data); |
241 | |
242 | /* extract a session ID |
243 | * Sessionid mutex must be locked (see Curl_ssl_sessionid_lock). |
244 | * Caller must make sure that the ownership of returned sessionid object |
245 | * is properly taken (e.g. its refcount is incremented |
246 | * under sessionid mutex). |
247 | */ |
248 | bool Curl_ssl_getsessionid(struct Curl_easy *data, |
249 | struct connectdata *conn, |
250 | const bool isProxy, |
251 | void **ssl_sessionid, |
252 | size_t *idsize, /* set 0 if unknown */ |
253 | int sockindex); |
254 | /* add a new session ID |
255 | * Sessionid mutex must be locked (see Curl_ssl_sessionid_lock). |
256 | * Caller must ensure that it has properly shared ownership of this sessionid |
257 | * object with cache (e.g. incrementing refcount on success) |
258 | */ |
259 | CURLcode Curl_ssl_addsessionid(struct Curl_easy *data, |
260 | struct connectdata *conn, |
261 | const bool isProxy, |
262 | void *ssl_sessionid, |
263 | size_t idsize, |
264 | int sockindex); |
265 | /* Kill a single session ID entry in the cache |
266 | * Sessionid mutex must be locked (see Curl_ssl_sessionid_lock). |
267 | * This will call engine-specific curlssl_session_free function, which must |
268 | * take sessionid object ownership from sessionid cache |
269 | * (e.g. decrement refcount). |
270 | */ |
271 | void Curl_ssl_kill_session(struct Curl_ssl_session *session); |
272 | /* delete a session from the cache |
273 | * Sessionid mutex must be locked (see Curl_ssl_sessionid_lock). |
274 | * This will call engine-specific curlssl_session_free function, which must |
275 | * take sessionid object ownership from sessionid cache |
276 | * (e.g. decrement refcount). |
277 | */ |
278 | void Curl_ssl_delsessionid(struct Curl_easy *data, void *ssl_sessionid); |
279 | |
280 | /* get N random bytes into the buffer */ |
281 | CURLcode Curl_ssl_random(struct Curl_easy *data, unsigned char *buffer, |
282 | size_t length); |
283 | /* Check pinned public key. */ |
284 | CURLcode Curl_pin_peer_pubkey(struct Curl_easy *data, |
285 | const char *pinnedpubkey, |
286 | const unsigned char *pubkey, size_t pubkeylen); |
287 | |
288 | bool Curl_ssl_cert_status_request(void); |
289 | |
290 | bool Curl_ssl_false_start(void); |
291 | |
292 | void Curl_ssl_associate_conn(struct Curl_easy *data, |
293 | struct connectdata *conn); |
294 | void Curl_ssl_detach_conn(struct Curl_easy *data, |
295 | struct connectdata *conn); |
296 | |
297 | #define SSL_SHUTDOWN_TIMEOUT 10000 /* ms */ |
298 | |
299 | #else /* if not USE_SSL */ |
300 | |
301 | /* When SSL support is not present, just define away these function calls */ |
302 | #define Curl_ssl_init() 1 |
303 | #define Curl_ssl_cleanup() Curl_nop_stmt |
304 | #define Curl_ssl_connect(x,y,z) CURLE_NOT_BUILT_IN |
305 | #define Curl_ssl_close_all(x) Curl_nop_stmt |
306 | #define Curl_ssl_close(x,y,z) Curl_nop_stmt |
307 | #define Curl_ssl_shutdown(x,y,z) CURLE_NOT_BUILT_IN |
308 | #define Curl_ssl_set_engine(x,y) CURLE_NOT_BUILT_IN |
309 | #define Curl_ssl_set_engine_default(x) CURLE_NOT_BUILT_IN |
310 | #define Curl_ssl_engines_list(x) NULL |
311 | #define Curl_ssl_send(a,b,c,d,e) -1 |
312 | #define Curl_ssl_recv(a,b,c,d,e) -1 |
313 | #define Curl_ssl_initsessions(x,y) CURLE_OK |
314 | #define Curl_ssl_data_pending(x,y) 0 |
315 | #define Curl_ssl_check_cxn(x) 0 |
316 | #define Curl_ssl_free_certinfo(x) Curl_nop_stmt |
317 | #define Curl_ssl_connect_nonblocking(x,y,z,w,a) CURLE_NOT_BUILT_IN |
318 | #define Curl_ssl_kill_session(x) Curl_nop_stmt |
319 | #define Curl_ssl_random(x,y,z) ((void)x, CURLE_NOT_BUILT_IN) |
320 | #define Curl_ssl_cert_status_request() FALSE |
321 | #define Curl_ssl_false_start() FALSE |
322 | #define Curl_ssl_tls13_ciphersuites() FALSE |
323 | #define Curl_ssl_associate_conn(a,b) Curl_nop_stmt |
324 | #define Curl_ssl_detach_conn(a,b) Curl_nop_stmt |
325 | #endif |
326 | |
327 | #endif /* HEADER_CURL_VTLS_H */ |
328 | |