1b7579f77SDag-Erling Smørgrav /* 2b7579f77SDag-Erling Smørgrav * util/net_help.c - implementation of the network helper code 3b7579f77SDag-Erling Smørgrav * 4b7579f77SDag-Erling Smørgrav * Copyright (c) 2007, NLnet Labs. All rights reserved. 5b7579f77SDag-Erling Smørgrav * 6b7579f77SDag-Erling Smørgrav * This software is open source. 7b7579f77SDag-Erling Smørgrav * 8b7579f77SDag-Erling Smørgrav * Redistribution and use in source and binary forms, with or without 9b7579f77SDag-Erling Smørgrav * modification, are permitted provided that the following conditions 10b7579f77SDag-Erling Smørgrav * are met: 11b7579f77SDag-Erling Smørgrav * 12b7579f77SDag-Erling Smørgrav * Redistributions of source code must retain the above copyright notice, 13b7579f77SDag-Erling Smørgrav * this list of conditions and the following disclaimer. 14b7579f77SDag-Erling Smørgrav * 15b7579f77SDag-Erling Smørgrav * Redistributions in binary form must reproduce the above copyright notice, 16b7579f77SDag-Erling Smørgrav * this list of conditions and the following disclaimer in the documentation 17b7579f77SDag-Erling Smørgrav * and/or other materials provided with the distribution. 18b7579f77SDag-Erling Smørgrav * 19b7579f77SDag-Erling Smørgrav * Neither the name of the NLNET LABS nor the names of its contributors may 20b7579f77SDag-Erling Smørgrav * be used to endorse or promote products derived from this software without 21b7579f77SDag-Erling Smørgrav * specific prior written permission. 22b7579f77SDag-Erling Smørgrav * 23b7579f77SDag-Erling Smørgrav * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 2417d15b25SDag-Erling Smørgrav * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 2517d15b25SDag-Erling Smørgrav * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 2617d15b25SDag-Erling Smørgrav * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 2717d15b25SDag-Erling Smørgrav * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 2817d15b25SDag-Erling Smørgrav * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED 2917d15b25SDag-Erling Smørgrav * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 3017d15b25SDag-Erling Smørgrav * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 3117d15b25SDag-Erling Smørgrav * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 3217d15b25SDag-Erling Smørgrav * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 3317d15b25SDag-Erling Smørgrav * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34b7579f77SDag-Erling Smørgrav */ 35b7579f77SDag-Erling Smørgrav /** 36b7579f77SDag-Erling Smørgrav * \file 37b7579f77SDag-Erling Smørgrav * Implementation of net_help.h. 38b7579f77SDag-Erling Smørgrav */ 39b7579f77SDag-Erling Smørgrav 40b7579f77SDag-Erling Smørgrav #include "config.h" 41b7579f77SDag-Erling Smørgrav #include "util/net_help.h" 42b7579f77SDag-Erling Smørgrav #include "util/log.h" 43b7579f77SDag-Erling Smørgrav #include "util/data/dname.h" 44b7579f77SDag-Erling Smørgrav #include "util/module.h" 45b7579f77SDag-Erling Smørgrav #include "util/regional.h" 46e86b9096SDag-Erling Smørgrav #include "util/config_file.h" 4709a3aaf3SDag-Erling Smørgrav #include "sldns/parseutil.h" 4809a3aaf3SDag-Erling Smørgrav #include "sldns/wire2str.h" 49b7579f77SDag-Erling Smørgrav #include <fcntl.h> 508ed2b524SDag-Erling Smørgrav #ifdef HAVE_OPENSSL_SSL_H 51b7579f77SDag-Erling Smørgrav #include <openssl/ssl.h> 52e86b9096SDag-Erling Smørgrav #include <openssl/evp.h> 53e86b9096SDag-Erling Smørgrav #include <openssl/rand.h> 548ed2b524SDag-Erling Smørgrav #endif 558ed2b524SDag-Erling Smørgrav #ifdef HAVE_OPENSSL_ERR_H 56b7579f77SDag-Erling Smørgrav #include <openssl/err.h> 578ed2b524SDag-Erling Smørgrav #endif 58*25039b37SCy Schubert #ifdef HAVE_OPENSSL_CORE_NAMES_H 59*25039b37SCy Schubert #include <openssl/core_names.h> 60*25039b37SCy Schubert #endif 613bd4df0aSDag-Erling Smørgrav #ifdef USE_WINSOCK 623bd4df0aSDag-Erling Smørgrav #include <wincrypt.h> 633bd4df0aSDag-Erling Smørgrav #endif 64b7579f77SDag-Erling Smørgrav 65b7579f77SDag-Erling Smørgrav /** max length of an IP address (the address portion) that we allow */ 66b7579f77SDag-Erling Smørgrav #define MAX_ADDR_STRLEN 128 /* characters */ 67b7579f77SDag-Erling Smørgrav /** default value for EDNS ADVERTISED size */ 68b7579f77SDag-Erling Smørgrav uint16_t EDNS_ADVERTISED_SIZE = 4096; 69b7579f77SDag-Erling Smørgrav 70b7579f77SDag-Erling Smørgrav /** minimal responses when positive answer: default is no */ 71b7579f77SDag-Erling Smørgrav int MINIMAL_RESPONSES = 0; 72b7579f77SDag-Erling Smørgrav 73*25039b37SCy Schubert /** rrset order roundrobin: default is yes */ 74*25039b37SCy Schubert int RRSET_ROUNDROBIN = 1; 75b7579f77SDag-Erling Smørgrav 76e86b9096SDag-Erling Smørgrav /** log tag queries with name instead of 'info' for filtering */ 77e86b9096SDag-Erling Smørgrav int LOG_TAG_QUERYREPLY = 0; 78e86b9096SDag-Erling Smørgrav 79e86b9096SDag-Erling Smørgrav static struct tls_session_ticket_key { 80e86b9096SDag-Erling Smørgrav unsigned char *key_name; 81e86b9096SDag-Erling Smørgrav unsigned char *aes_key; 82e86b9096SDag-Erling Smørgrav unsigned char *hmac_key; 83e86b9096SDag-Erling Smørgrav } *ticket_keys; 84e86b9096SDag-Erling Smørgrav 85*25039b37SCy Schubert /** 86*25039b37SCy Schubert * callback TLS session ticket encrypt and decrypt 87*25039b37SCy Schubert * For use with SSL_CTX_set_tlsext_ticket_key_cb or 88*25039b37SCy Schubert * SSL_CTX_set_tlsext_ticket_key_evp_cb 89*25039b37SCy Schubert * @param s: the SSL_CTX to use (from connect_sslctx_create()) 90*25039b37SCy Schubert * @param key_name: secret name, 16 bytes 91*25039b37SCy Schubert * @param iv: up to EVP_MAX_IV_LENGTH. 92*25039b37SCy Schubert * @param evp_ctx: the evp cipher context, function sets this. 93*25039b37SCy Schubert * @param hmac_ctx: the hmac context, function sets this. 94*25039b37SCy Schubert * with ..key_cb it is of type HMAC_CTX* 95*25039b37SCy Schubert * with ..key_evp_cb it is of type EVP_MAC_CTX* 96*25039b37SCy Schubert * @param enc: 1 is encrypt, 0 is decrypt 97*25039b37SCy Schubert * @return 0 on no ticket, 1 for okay, and 2 for okay but renew the ticket 98*25039b37SCy Schubert * (the ticket is decrypt only). and <0 for failures. 99*25039b37SCy Schubert */ 100*25039b37SCy Schubert #ifdef HAVE_SSL 101*25039b37SCy Schubert int tls_session_ticket_key_cb(SSL *s, unsigned char* key_name, 102*25039b37SCy Schubert unsigned char* iv, EVP_CIPHER_CTX *evp_ctx, 103*25039b37SCy Schubert #ifdef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB 104*25039b37SCy Schubert EVP_MAC_CTX *hmac_ctx, 105*25039b37SCy Schubert #else 106*25039b37SCy Schubert HMAC_CTX* hmac_ctx, 107*25039b37SCy Schubert #endif 108*25039b37SCy Schubert int enc); 109*25039b37SCy Schubert #endif /* HAVE_SSL */ 110*25039b37SCy Schubert 111b7579f77SDag-Erling Smørgrav /* returns true is string addr is an ip6 specced address */ 112b7579f77SDag-Erling Smørgrav int 113b7579f77SDag-Erling Smørgrav str_is_ip6(const char* str) 114b7579f77SDag-Erling Smørgrav { 115b7579f77SDag-Erling Smørgrav if(strchr(str, ':')) 116b7579f77SDag-Erling Smørgrav return 1; 117b7579f77SDag-Erling Smørgrav else return 0; 118b7579f77SDag-Erling Smørgrav } 119b7579f77SDag-Erling Smørgrav 120b7579f77SDag-Erling Smørgrav int 121b7579f77SDag-Erling Smørgrav fd_set_nonblock(int s) 122b7579f77SDag-Erling Smørgrav { 123b7579f77SDag-Erling Smørgrav #ifdef HAVE_FCNTL 124b7579f77SDag-Erling Smørgrav int flag; 125b7579f77SDag-Erling Smørgrav if((flag = fcntl(s, F_GETFL)) == -1) { 126b7579f77SDag-Erling Smørgrav log_err("can't fcntl F_GETFL: %s", strerror(errno)); 127b7579f77SDag-Erling Smørgrav flag = 0; 128b7579f77SDag-Erling Smørgrav } 129b7579f77SDag-Erling Smørgrav flag |= O_NONBLOCK; 130b7579f77SDag-Erling Smørgrav if(fcntl(s, F_SETFL, flag) == -1) { 131b7579f77SDag-Erling Smørgrav log_err("can't fcntl F_SETFL: %s", strerror(errno)); 132b7579f77SDag-Erling Smørgrav return 0; 133b7579f77SDag-Erling Smørgrav } 134b7579f77SDag-Erling Smørgrav #elif defined(HAVE_IOCTLSOCKET) 135b7579f77SDag-Erling Smørgrav unsigned long on = 1; 136b7579f77SDag-Erling Smørgrav if(ioctlsocket(s, FIONBIO, &on) != 0) { 137b7579f77SDag-Erling Smørgrav log_err("can't ioctlsocket FIONBIO on: %s", 138b7579f77SDag-Erling Smørgrav wsa_strerror(WSAGetLastError())); 139b7579f77SDag-Erling Smørgrav } 140b7579f77SDag-Erling Smørgrav #endif 141b7579f77SDag-Erling Smørgrav return 1; 142b7579f77SDag-Erling Smørgrav } 143b7579f77SDag-Erling Smørgrav 144b7579f77SDag-Erling Smørgrav int 145b7579f77SDag-Erling Smørgrav fd_set_block(int s) 146b7579f77SDag-Erling Smørgrav { 147b7579f77SDag-Erling Smørgrav #ifdef HAVE_FCNTL 148b7579f77SDag-Erling Smørgrav int flag; 149b7579f77SDag-Erling Smørgrav if((flag = fcntl(s, F_GETFL)) == -1) { 150b7579f77SDag-Erling Smørgrav log_err("cannot fcntl F_GETFL: %s", strerror(errno)); 151b7579f77SDag-Erling Smørgrav flag = 0; 152b7579f77SDag-Erling Smørgrav } 153b7579f77SDag-Erling Smørgrav flag &= ~O_NONBLOCK; 154b7579f77SDag-Erling Smørgrav if(fcntl(s, F_SETFL, flag) == -1) { 155b7579f77SDag-Erling Smørgrav log_err("cannot fcntl F_SETFL: %s", strerror(errno)); 156b7579f77SDag-Erling Smørgrav return 0; 157b7579f77SDag-Erling Smørgrav } 158b7579f77SDag-Erling Smørgrav #elif defined(HAVE_IOCTLSOCKET) 159b7579f77SDag-Erling Smørgrav unsigned long off = 0; 160b7579f77SDag-Erling Smørgrav if(ioctlsocket(s, FIONBIO, &off) != 0) { 161971980c3SDag-Erling Smørgrav if(WSAGetLastError() != WSAEINVAL || verbosity >= 4) 162b7579f77SDag-Erling Smørgrav log_err("can't ioctlsocket FIONBIO off: %s", 163b7579f77SDag-Erling Smørgrav wsa_strerror(WSAGetLastError())); 164b7579f77SDag-Erling Smørgrav } 165b7579f77SDag-Erling Smørgrav #endif 166b7579f77SDag-Erling Smørgrav return 1; 167b7579f77SDag-Erling Smørgrav } 168b7579f77SDag-Erling Smørgrav 169b7579f77SDag-Erling Smørgrav int 170b7579f77SDag-Erling Smørgrav is_pow2(size_t num) 171b7579f77SDag-Erling Smørgrav { 172b7579f77SDag-Erling Smørgrav if(num == 0) return 1; 173b7579f77SDag-Erling Smørgrav return (num & (num-1)) == 0; 174b7579f77SDag-Erling Smørgrav } 175b7579f77SDag-Erling Smørgrav 176b7579f77SDag-Erling Smørgrav void* 177b7579f77SDag-Erling Smørgrav memdup(void* data, size_t len) 178b7579f77SDag-Erling Smørgrav { 179b7579f77SDag-Erling Smørgrav void* d; 180b7579f77SDag-Erling Smørgrav if(!data) return NULL; 181b7579f77SDag-Erling Smørgrav if(len == 0) return NULL; 182b7579f77SDag-Erling Smørgrav d = malloc(len); 183b7579f77SDag-Erling Smørgrav if(!d) return NULL; 184b7579f77SDag-Erling Smørgrav memcpy(d, data, len); 185b7579f77SDag-Erling Smørgrav return d; 186b7579f77SDag-Erling Smørgrav } 187b7579f77SDag-Erling Smørgrav 188b7579f77SDag-Erling Smørgrav void 189b7579f77SDag-Erling Smørgrav log_addr(enum verbosity_value v, const char* str, 190b7579f77SDag-Erling Smørgrav struct sockaddr_storage* addr, socklen_t addrlen) 191b7579f77SDag-Erling Smørgrav { 192b7579f77SDag-Erling Smørgrav uint16_t port; 193b7579f77SDag-Erling Smørgrav const char* family = "unknown"; 194b7579f77SDag-Erling Smørgrav char dest[100]; 195b7579f77SDag-Erling Smørgrav int af = (int)((struct sockaddr_in*)addr)->sin_family; 196b7579f77SDag-Erling Smørgrav void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr; 197b7579f77SDag-Erling Smørgrav if(verbosity < v) 198b7579f77SDag-Erling Smørgrav return; 199b7579f77SDag-Erling Smørgrav switch(af) { 200b7579f77SDag-Erling Smørgrav case AF_INET: family="ip4"; break; 201b7579f77SDag-Erling Smørgrav case AF_INET6: family="ip6"; 202b7579f77SDag-Erling Smørgrav sinaddr = &((struct sockaddr_in6*)addr)->sin6_addr; 203b7579f77SDag-Erling Smørgrav break; 2046480faa8SDag-Erling Smørgrav case AF_LOCAL: 2056480faa8SDag-Erling Smørgrav dest[0]=0; 2066480faa8SDag-Erling Smørgrav (void)inet_ntop(af, sinaddr, dest, 2076480faa8SDag-Erling Smørgrav (socklen_t)sizeof(dest)); 2086480faa8SDag-Erling Smørgrav verbose(v, "%s local %s", str, dest); 2096480faa8SDag-Erling Smørgrav return; /* do not continue and try to get port */ 210b7579f77SDag-Erling Smørgrav default: break; 211b7579f77SDag-Erling Smørgrav } 212b7579f77SDag-Erling Smørgrav if(inet_ntop(af, sinaddr, dest, (socklen_t)sizeof(dest)) == 0) { 21317d15b25SDag-Erling Smørgrav (void)strlcpy(dest, "(inet_ntop error)", sizeof(dest)); 214b7579f77SDag-Erling Smørgrav } 215b7579f77SDag-Erling Smørgrav dest[sizeof(dest)-1] = 0; 216b7579f77SDag-Erling Smørgrav port = ntohs(((struct sockaddr_in*)addr)->sin_port); 217b7579f77SDag-Erling Smørgrav if(verbosity >= 4) 218b7579f77SDag-Erling Smørgrav verbose(v, "%s %s %s port %d (len %d)", str, family, dest, 219b7579f77SDag-Erling Smørgrav (int)port, (int)addrlen); 220b7579f77SDag-Erling Smørgrav else verbose(v, "%s %s port %d", str, dest, (int)port); 221b7579f77SDag-Erling Smørgrav } 222b7579f77SDag-Erling Smørgrav 223b7579f77SDag-Erling Smørgrav int 224b7579f77SDag-Erling Smørgrav extstrtoaddr(const char* str, struct sockaddr_storage* addr, 225b7579f77SDag-Erling Smørgrav socklen_t* addrlen) 226b7579f77SDag-Erling Smørgrav { 227b7579f77SDag-Erling Smørgrav char* s; 228b7579f77SDag-Erling Smørgrav int port = UNBOUND_DNS_PORT; 229b7579f77SDag-Erling Smørgrav if((s=strchr(str, '@'))) { 230b7579f77SDag-Erling Smørgrav char buf[MAX_ADDR_STRLEN]; 231b7579f77SDag-Erling Smørgrav if(s-str >= MAX_ADDR_STRLEN) { 232b7579f77SDag-Erling Smørgrav return 0; 233b7579f77SDag-Erling Smørgrav } 23417d15b25SDag-Erling Smørgrav (void)strlcpy(buf, str, sizeof(buf)); 235b7579f77SDag-Erling Smørgrav buf[s-str] = 0; 236b7579f77SDag-Erling Smørgrav port = atoi(s+1); 237b7579f77SDag-Erling Smørgrav if(port == 0 && strcmp(s+1,"0")!=0) { 238b7579f77SDag-Erling Smørgrav return 0; 239b7579f77SDag-Erling Smørgrav } 240b7579f77SDag-Erling Smørgrav return ipstrtoaddr(buf, port, addr, addrlen); 241b7579f77SDag-Erling Smørgrav } 242b7579f77SDag-Erling Smørgrav return ipstrtoaddr(str, port, addr, addrlen); 243b7579f77SDag-Erling Smørgrav } 244b7579f77SDag-Erling Smørgrav 245b7579f77SDag-Erling Smørgrav 246b7579f77SDag-Erling Smørgrav int 247b7579f77SDag-Erling Smørgrav ipstrtoaddr(const char* ip, int port, struct sockaddr_storage* addr, 248b7579f77SDag-Erling Smørgrav socklen_t* addrlen) 249b7579f77SDag-Erling Smørgrav { 250b7579f77SDag-Erling Smørgrav uint16_t p; 251b7579f77SDag-Erling Smørgrav if(!ip) return 0; 252b7579f77SDag-Erling Smørgrav p = (uint16_t) port; 253b7579f77SDag-Erling Smørgrav if(str_is_ip6(ip)) { 254b7579f77SDag-Erling Smørgrav char buf[MAX_ADDR_STRLEN]; 255b7579f77SDag-Erling Smørgrav char* s; 256b7579f77SDag-Erling Smørgrav struct sockaddr_in6* sa = (struct sockaddr_in6*)addr; 257b7579f77SDag-Erling Smørgrav *addrlen = (socklen_t)sizeof(struct sockaddr_in6); 258b7579f77SDag-Erling Smørgrav memset(sa, 0, *addrlen); 259b7579f77SDag-Erling Smørgrav sa->sin6_family = AF_INET6; 260b7579f77SDag-Erling Smørgrav sa->sin6_port = (in_port_t)htons(p); 261b7579f77SDag-Erling Smørgrav if((s=strchr(ip, '%'))) { /* ip6%interface, rfc 4007 */ 262b7579f77SDag-Erling Smørgrav if(s-ip >= MAX_ADDR_STRLEN) 263b7579f77SDag-Erling Smørgrav return 0; 26417d15b25SDag-Erling Smørgrav (void)strlcpy(buf, ip, sizeof(buf)); 265b7579f77SDag-Erling Smørgrav buf[s-ip]=0; 266b7579f77SDag-Erling Smørgrav sa->sin6_scope_id = (uint32_t)atoi(s+1); 267b7579f77SDag-Erling Smørgrav ip = buf; 268b7579f77SDag-Erling Smørgrav } 269b7579f77SDag-Erling Smørgrav if(inet_pton((int)sa->sin6_family, ip, &sa->sin6_addr) <= 0) { 270b7579f77SDag-Erling Smørgrav return 0; 271b7579f77SDag-Erling Smørgrav } 272b7579f77SDag-Erling Smørgrav } else { /* ip4 */ 273b7579f77SDag-Erling Smørgrav struct sockaddr_in* sa = (struct sockaddr_in*)addr; 274b7579f77SDag-Erling Smørgrav *addrlen = (socklen_t)sizeof(struct sockaddr_in); 275b7579f77SDag-Erling Smørgrav memset(sa, 0, *addrlen); 276b7579f77SDag-Erling Smørgrav sa->sin_family = AF_INET; 277b7579f77SDag-Erling Smørgrav sa->sin_port = (in_port_t)htons(p); 278b7579f77SDag-Erling Smørgrav if(inet_pton((int)sa->sin_family, ip, &sa->sin_addr) <= 0) { 279b7579f77SDag-Erling Smørgrav return 0; 280b7579f77SDag-Erling Smørgrav } 281b7579f77SDag-Erling Smørgrav } 282b7579f77SDag-Erling Smørgrav return 1; 283b7579f77SDag-Erling Smørgrav } 284b7579f77SDag-Erling Smørgrav 285b7579f77SDag-Erling Smørgrav int netblockstrtoaddr(const char* str, int port, struct sockaddr_storage* addr, 286b7579f77SDag-Erling Smørgrav socklen_t* addrlen, int* net) 287b7579f77SDag-Erling Smørgrav { 2880fb34990SDag-Erling Smørgrav char buf[64]; 2890fb34990SDag-Erling Smørgrav char* s; 290b7579f77SDag-Erling Smørgrav *net = (str_is_ip6(str)?128:32); 291b7579f77SDag-Erling Smørgrav if((s=strchr(str, '/'))) { 292b7579f77SDag-Erling Smørgrav if(atoi(s+1) > *net) { 293b7579f77SDag-Erling Smørgrav log_err("netblock too large: %s", str); 294b7579f77SDag-Erling Smørgrav return 0; 295b7579f77SDag-Erling Smørgrav } 296b7579f77SDag-Erling Smørgrav *net = atoi(s+1); 297b7579f77SDag-Erling Smørgrav if(*net == 0 && strcmp(s+1, "0") != 0) { 298b7579f77SDag-Erling Smørgrav log_err("cannot parse netblock: '%s'", str); 299b7579f77SDag-Erling Smørgrav return 0; 300b7579f77SDag-Erling Smørgrav } 3010fb34990SDag-Erling Smørgrav strlcpy(buf, str, sizeof(buf)); 3020fb34990SDag-Erling Smørgrav s = strchr(buf, '/'); 3030fb34990SDag-Erling Smørgrav if(s) *s = 0; 3040fb34990SDag-Erling Smørgrav s = buf; 305b7579f77SDag-Erling Smørgrav } 306b7579f77SDag-Erling Smørgrav if(!ipstrtoaddr(s?s:str, port, addr, addrlen)) { 307b7579f77SDag-Erling Smørgrav log_err("cannot parse ip address: '%s'", str); 308b7579f77SDag-Erling Smørgrav return 0; 309b7579f77SDag-Erling Smørgrav } 310b7579f77SDag-Erling Smørgrav if(s) { 311b7579f77SDag-Erling Smørgrav addr_mask(addr, *addrlen, *net); 312b7579f77SDag-Erling Smørgrav } 313b7579f77SDag-Erling Smørgrav return 1; 314b7579f77SDag-Erling Smørgrav } 315b7579f77SDag-Erling Smørgrav 316091e9e46SCy Schubert /* RPZ format address dname to network byte order address */ 317091e9e46SCy Schubert static int ipdnametoaddr(uint8_t* dname, size_t dnamelen, 318091e9e46SCy Schubert struct sockaddr_storage* addr, socklen_t* addrlen, int* af) 319091e9e46SCy Schubert { 320091e9e46SCy Schubert uint8_t* ia; 321091e9e46SCy Schubert size_t dnamelabs = dname_count_labels(dname); 322091e9e46SCy Schubert uint8_t lablen; 323091e9e46SCy Schubert char* e = NULL; 324091e9e46SCy Schubert int z = 0; 325091e9e46SCy Schubert size_t len = 0; 326091e9e46SCy Schubert int i; 327091e9e46SCy Schubert *af = AF_INET; 328091e9e46SCy Schubert 329091e9e46SCy Schubert /* need 1 byte for label length */ 330091e9e46SCy Schubert if(dnamelen < 1) 331091e9e46SCy Schubert return 0; 332091e9e46SCy Schubert 333091e9e46SCy Schubert if(dnamelabs > 6 || 334091e9e46SCy Schubert dname_has_label(dname, dnamelen, (uint8_t*)"\002zz")) { 335091e9e46SCy Schubert *af = AF_INET6; 336091e9e46SCy Schubert } 337091e9e46SCy Schubert len = *dname; 338091e9e46SCy Schubert lablen = *dname++; 339091e9e46SCy Schubert i = (*af == AF_INET) ? 3 : 15; 340091e9e46SCy Schubert if(*af == AF_INET6) { 341091e9e46SCy Schubert struct sockaddr_in6* sa = (struct sockaddr_in6*)addr; 342091e9e46SCy Schubert *addrlen = (socklen_t)sizeof(struct sockaddr_in6); 343091e9e46SCy Schubert memset(sa, 0, *addrlen); 344091e9e46SCy Schubert sa->sin6_family = AF_INET6; 345091e9e46SCy Schubert ia = (uint8_t*)&sa->sin6_addr; 346091e9e46SCy Schubert } else { /* ip4 */ 347091e9e46SCy Schubert struct sockaddr_in* sa = (struct sockaddr_in*)addr; 348091e9e46SCy Schubert *addrlen = (socklen_t)sizeof(struct sockaddr_in); 349091e9e46SCy Schubert memset(sa, 0, *addrlen); 350091e9e46SCy Schubert sa->sin_family = AF_INET; 351091e9e46SCy Schubert ia = (uint8_t*)&sa->sin_addr; 352091e9e46SCy Schubert } 353091e9e46SCy Schubert while(lablen && i >= 0 && len <= dnamelen) { 354091e9e46SCy Schubert char buff[LDNS_MAX_LABELLEN+1]; 355091e9e46SCy Schubert uint16_t chunk; /* big enough to not overflow on IPv6 hextet */ 356091e9e46SCy Schubert if((*af == AF_INET && (lablen > 3 || dnamelabs > 6)) || 357091e9e46SCy Schubert (*af == AF_INET6 && (lablen > 4 || dnamelabs > 10))) { 358091e9e46SCy Schubert return 0; 359091e9e46SCy Schubert } 360091e9e46SCy Schubert if(memcmp(dname, "zz", 2) == 0 && *af == AF_INET6) { 361091e9e46SCy Schubert /* Add one or more 0 labels. Address is initialised at 362091e9e46SCy Schubert * 0, so just skip the zero part. */ 363091e9e46SCy Schubert int zl = 11 - dnamelabs; 364091e9e46SCy Schubert if(z || zl < 0) 365091e9e46SCy Schubert return 0; 366091e9e46SCy Schubert z = 1; 367091e9e46SCy Schubert i -= (zl*2); 368091e9e46SCy Schubert } else { 369091e9e46SCy Schubert memcpy(buff, dname, lablen); 370091e9e46SCy Schubert buff[lablen] = '\0'; 371091e9e46SCy Schubert chunk = strtol(buff, &e, (*af == AF_INET) ? 10 : 16); 372091e9e46SCy Schubert if(!e || *e != '\0' || (*af == AF_INET && chunk > 255)) 373091e9e46SCy Schubert return 0; 374091e9e46SCy Schubert if(*af == AF_INET) { 375091e9e46SCy Schubert log_assert(i < 4 && i >= 0); 376091e9e46SCy Schubert ia[i] = (uint8_t)chunk; 377091e9e46SCy Schubert i--; 378091e9e46SCy Schubert } else { 379091e9e46SCy Schubert log_assert(i < 16 && i >= 1); 380091e9e46SCy Schubert /* ia in network byte order */ 381091e9e46SCy Schubert ia[i-1] = (uint8_t)(chunk >> 8); 382091e9e46SCy Schubert ia[i] = (uint8_t)(chunk & 0x00FF); 383091e9e46SCy Schubert i -= 2; 384091e9e46SCy Schubert } 385091e9e46SCy Schubert } 386091e9e46SCy Schubert dname += lablen; 387091e9e46SCy Schubert lablen = *dname++; 388091e9e46SCy Schubert len += lablen; 389091e9e46SCy Schubert } 390091e9e46SCy Schubert if(i != -1) 391091e9e46SCy Schubert /* input too short */ 392091e9e46SCy Schubert return 0; 393091e9e46SCy Schubert return 1; 394091e9e46SCy Schubert } 395091e9e46SCy Schubert 396091e9e46SCy Schubert int netblockdnametoaddr(uint8_t* dname, size_t dnamelen, 397091e9e46SCy Schubert struct sockaddr_storage* addr, socklen_t* addrlen, int* net, int* af) 398091e9e46SCy Schubert { 399091e9e46SCy Schubert char buff[3 /* 3 digit netblock */ + 1]; 400091e9e46SCy Schubert size_t nlablen; 401091e9e46SCy Schubert if(dnamelen < 1 || *dname > 3) 402091e9e46SCy Schubert /* netblock invalid */ 403091e9e46SCy Schubert return 0; 404091e9e46SCy Schubert nlablen = *dname; 405091e9e46SCy Schubert 406091e9e46SCy Schubert if(dnamelen < 1 + nlablen) 407091e9e46SCy Schubert return 0; 408091e9e46SCy Schubert 409091e9e46SCy Schubert memcpy(buff, dname+1, nlablen); 410091e9e46SCy Schubert buff[nlablen] = '\0'; 411091e9e46SCy Schubert *net = atoi(buff); 412091e9e46SCy Schubert if(*net == 0 && strcmp(buff, "0") != 0) 413091e9e46SCy Schubert return 0; 414091e9e46SCy Schubert dname += nlablen; 415091e9e46SCy Schubert dname++; 416091e9e46SCy Schubert if(!ipdnametoaddr(dname, dnamelen-1-nlablen, addr, addrlen, af)) 417091e9e46SCy Schubert return 0; 418091e9e46SCy Schubert if((*af == AF_INET6 && *net > 128) || (*af == AF_INET && *net > 32)) 419091e9e46SCy Schubert return 0; 420091e9e46SCy Schubert return 1; 421091e9e46SCy Schubert } 422091e9e46SCy Schubert 4230fb34990SDag-Erling Smørgrav int authextstrtoaddr(char* str, struct sockaddr_storage* addr, 4240fb34990SDag-Erling Smørgrav socklen_t* addrlen, char** auth_name) 4250fb34990SDag-Erling Smørgrav { 4260fb34990SDag-Erling Smørgrav char* s; 4270fb34990SDag-Erling Smørgrav int port = UNBOUND_DNS_PORT; 4280fb34990SDag-Erling Smørgrav if((s=strchr(str, '@'))) { 4290fb34990SDag-Erling Smørgrav char buf[MAX_ADDR_STRLEN]; 4300fb34990SDag-Erling Smørgrav size_t len = (size_t)(s-str); 4310fb34990SDag-Erling Smørgrav char* hash = strchr(s+1, '#'); 4320fb34990SDag-Erling Smørgrav if(hash) { 4330fb34990SDag-Erling Smørgrav *auth_name = hash+1; 4340fb34990SDag-Erling Smørgrav } else { 4350fb34990SDag-Erling Smørgrav *auth_name = NULL; 4360fb34990SDag-Erling Smørgrav } 4370fb34990SDag-Erling Smørgrav if(len >= MAX_ADDR_STRLEN) { 4380fb34990SDag-Erling Smørgrav return 0; 4390fb34990SDag-Erling Smørgrav } 4400fb34990SDag-Erling Smørgrav (void)strlcpy(buf, str, sizeof(buf)); 4410fb34990SDag-Erling Smørgrav buf[len] = 0; 4420fb34990SDag-Erling Smørgrav port = atoi(s+1); 4430fb34990SDag-Erling Smørgrav if(port == 0) { 4440fb34990SDag-Erling Smørgrav if(!hash && strcmp(s+1,"0")!=0) 4450fb34990SDag-Erling Smørgrav return 0; 4460fb34990SDag-Erling Smørgrav if(hash && strncmp(s+1,"0#",2)!=0) 4470fb34990SDag-Erling Smørgrav return 0; 4480fb34990SDag-Erling Smørgrav } 4490fb34990SDag-Erling Smørgrav return ipstrtoaddr(buf, port, addr, addrlen); 4500fb34990SDag-Erling Smørgrav } 4510fb34990SDag-Erling Smørgrav if((s=strchr(str, '#'))) { 4520fb34990SDag-Erling Smørgrav char buf[MAX_ADDR_STRLEN]; 4530fb34990SDag-Erling Smørgrav size_t len = (size_t)(s-str); 4540fb34990SDag-Erling Smørgrav if(len >= MAX_ADDR_STRLEN) { 4550fb34990SDag-Erling Smørgrav return 0; 4560fb34990SDag-Erling Smørgrav } 4570fb34990SDag-Erling Smørgrav (void)strlcpy(buf, str, sizeof(buf)); 4580fb34990SDag-Erling Smørgrav buf[len] = 0; 4590fb34990SDag-Erling Smørgrav port = UNBOUND_DNS_OVER_TLS_PORT; 4600fb34990SDag-Erling Smørgrav *auth_name = s+1; 4610fb34990SDag-Erling Smørgrav return ipstrtoaddr(buf, port, addr, addrlen); 4620fb34990SDag-Erling Smørgrav } 4630fb34990SDag-Erling Smørgrav *auth_name = NULL; 4640fb34990SDag-Erling Smørgrav return ipstrtoaddr(str, port, addr, addrlen); 4650fb34990SDag-Erling Smørgrav } 4660fb34990SDag-Erling Smørgrav 46757bddd21SDag-Erling Smørgrav /** store port number into sockaddr structure */ 46857bddd21SDag-Erling Smørgrav void 46957bddd21SDag-Erling Smørgrav sockaddr_store_port(struct sockaddr_storage* addr, socklen_t addrlen, int port) 47057bddd21SDag-Erling Smørgrav { 47157bddd21SDag-Erling Smørgrav if(addr_is_ip6(addr, addrlen)) { 47257bddd21SDag-Erling Smørgrav struct sockaddr_in6* sa = (struct sockaddr_in6*)addr; 47357bddd21SDag-Erling Smørgrav sa->sin6_port = (in_port_t)htons((uint16_t)port); 47457bddd21SDag-Erling Smørgrav } else { 47557bddd21SDag-Erling Smørgrav struct sockaddr_in* sa = (struct sockaddr_in*)addr; 47657bddd21SDag-Erling Smørgrav sa->sin_port = (in_port_t)htons((uint16_t)port); 47757bddd21SDag-Erling Smørgrav } 47857bddd21SDag-Erling Smørgrav } 47957bddd21SDag-Erling Smørgrav 480b7579f77SDag-Erling Smørgrav void 481b7579f77SDag-Erling Smørgrav log_nametypeclass(enum verbosity_value v, const char* str, uint8_t* name, 482b7579f77SDag-Erling Smørgrav uint16_t type, uint16_t dclass) 483b7579f77SDag-Erling Smørgrav { 484b7579f77SDag-Erling Smørgrav char buf[LDNS_MAX_DOMAINLEN+1]; 485b7579f77SDag-Erling Smørgrav char t[12], c[12]; 486b7579f77SDag-Erling Smørgrav const char *ts, *cs; 487b7579f77SDag-Erling Smørgrav if(verbosity < v) 488b7579f77SDag-Erling Smørgrav return; 489b7579f77SDag-Erling Smørgrav dname_str(name, buf); 490b7579f77SDag-Erling Smørgrav if(type == LDNS_RR_TYPE_TSIG) ts = "TSIG"; 491b7579f77SDag-Erling Smørgrav else if(type == LDNS_RR_TYPE_IXFR) ts = "IXFR"; 492b7579f77SDag-Erling Smørgrav else if(type == LDNS_RR_TYPE_AXFR) ts = "AXFR"; 493b7579f77SDag-Erling Smørgrav else if(type == LDNS_RR_TYPE_MAILB) ts = "MAILB"; 494b7579f77SDag-Erling Smørgrav else if(type == LDNS_RR_TYPE_MAILA) ts = "MAILA"; 495b7579f77SDag-Erling Smørgrav else if(type == LDNS_RR_TYPE_ANY) ts = "ANY"; 49617d15b25SDag-Erling Smørgrav else if(sldns_rr_descript(type) && sldns_rr_descript(type)->_name) 49717d15b25SDag-Erling Smørgrav ts = sldns_rr_descript(type)->_name; 498b7579f77SDag-Erling Smørgrav else { 499b7579f77SDag-Erling Smørgrav snprintf(t, sizeof(t), "TYPE%d", (int)type); 500b7579f77SDag-Erling Smørgrav ts = t; 501b7579f77SDag-Erling Smørgrav } 50217d15b25SDag-Erling Smørgrav if(sldns_lookup_by_id(sldns_rr_classes, (int)dclass) && 50317d15b25SDag-Erling Smørgrav sldns_lookup_by_id(sldns_rr_classes, (int)dclass)->name) 50417d15b25SDag-Erling Smørgrav cs = sldns_lookup_by_id(sldns_rr_classes, (int)dclass)->name; 505b7579f77SDag-Erling Smørgrav else { 506b7579f77SDag-Erling Smørgrav snprintf(c, sizeof(c), "CLASS%d", (int)dclass); 507b7579f77SDag-Erling Smørgrav cs = c; 508b7579f77SDag-Erling Smørgrav } 509b7579f77SDag-Erling Smørgrav log_info("%s %s %s %s", str, buf, ts, cs); 510b7579f77SDag-Erling Smørgrav } 511b7579f77SDag-Erling Smørgrav 512e86b9096SDag-Erling Smørgrav void 513e86b9096SDag-Erling Smørgrav log_query_in(const char* str, uint8_t* name, uint16_t type, uint16_t dclass) 514e86b9096SDag-Erling Smørgrav { 515e86b9096SDag-Erling Smørgrav char buf[LDNS_MAX_DOMAINLEN+1]; 516e86b9096SDag-Erling Smørgrav char t[12], c[12]; 517e86b9096SDag-Erling Smørgrav const char *ts, *cs; 518e86b9096SDag-Erling Smørgrav dname_str(name, buf); 519e86b9096SDag-Erling Smørgrav if(type == LDNS_RR_TYPE_TSIG) ts = "TSIG"; 520e86b9096SDag-Erling Smørgrav else if(type == LDNS_RR_TYPE_IXFR) ts = "IXFR"; 521e86b9096SDag-Erling Smørgrav else if(type == LDNS_RR_TYPE_AXFR) ts = "AXFR"; 522e86b9096SDag-Erling Smørgrav else if(type == LDNS_RR_TYPE_MAILB) ts = "MAILB"; 523e86b9096SDag-Erling Smørgrav else if(type == LDNS_RR_TYPE_MAILA) ts = "MAILA"; 524e86b9096SDag-Erling Smørgrav else if(type == LDNS_RR_TYPE_ANY) ts = "ANY"; 525e86b9096SDag-Erling Smørgrav else if(sldns_rr_descript(type) && sldns_rr_descript(type)->_name) 526e86b9096SDag-Erling Smørgrav ts = sldns_rr_descript(type)->_name; 527e86b9096SDag-Erling Smørgrav else { 528e86b9096SDag-Erling Smørgrav snprintf(t, sizeof(t), "TYPE%d", (int)type); 529e86b9096SDag-Erling Smørgrav ts = t; 530e86b9096SDag-Erling Smørgrav } 531e86b9096SDag-Erling Smørgrav if(sldns_lookup_by_id(sldns_rr_classes, (int)dclass) && 532e86b9096SDag-Erling Smørgrav sldns_lookup_by_id(sldns_rr_classes, (int)dclass)->name) 533e86b9096SDag-Erling Smørgrav cs = sldns_lookup_by_id(sldns_rr_classes, (int)dclass)->name; 534e86b9096SDag-Erling Smørgrav else { 535e86b9096SDag-Erling Smørgrav snprintf(c, sizeof(c), "CLASS%d", (int)dclass); 536e86b9096SDag-Erling Smørgrav cs = c; 537e86b9096SDag-Erling Smørgrav } 538e86b9096SDag-Erling Smørgrav if(LOG_TAG_QUERYREPLY) 539e86b9096SDag-Erling Smørgrav log_query("%s %s %s %s", str, buf, ts, cs); 540e86b9096SDag-Erling Smørgrav else log_info("%s %s %s %s", str, buf, ts, cs); 541e86b9096SDag-Erling Smørgrav } 542e86b9096SDag-Erling Smørgrav 543b7579f77SDag-Erling Smørgrav void log_name_addr(enum verbosity_value v, const char* str, uint8_t* zone, 544b7579f77SDag-Erling Smørgrav struct sockaddr_storage* addr, socklen_t addrlen) 545b7579f77SDag-Erling Smørgrav { 546b7579f77SDag-Erling Smørgrav uint16_t port; 547b7579f77SDag-Erling Smørgrav const char* family = "unknown_family "; 548b7579f77SDag-Erling Smørgrav char namebuf[LDNS_MAX_DOMAINLEN+1]; 549b7579f77SDag-Erling Smørgrav char dest[100]; 550b7579f77SDag-Erling Smørgrav int af = (int)((struct sockaddr_in*)addr)->sin_family; 551b7579f77SDag-Erling Smørgrav void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr; 552b7579f77SDag-Erling Smørgrav if(verbosity < v) 553b7579f77SDag-Erling Smørgrav return; 554b7579f77SDag-Erling Smørgrav switch(af) { 555b7579f77SDag-Erling Smørgrav case AF_INET: family=""; break; 556b7579f77SDag-Erling Smørgrav case AF_INET6: family=""; 557b7579f77SDag-Erling Smørgrav sinaddr = &((struct sockaddr_in6*)addr)->sin6_addr; 558b7579f77SDag-Erling Smørgrav break; 55931099b50SDag-Erling Smørgrav case AF_LOCAL: family="local "; break; 560b7579f77SDag-Erling Smørgrav default: break; 561b7579f77SDag-Erling Smørgrav } 562b7579f77SDag-Erling Smørgrav if(inet_ntop(af, sinaddr, dest, (socklen_t)sizeof(dest)) == 0) { 56317d15b25SDag-Erling Smørgrav (void)strlcpy(dest, "(inet_ntop error)", sizeof(dest)); 564b7579f77SDag-Erling Smørgrav } 565b7579f77SDag-Erling Smørgrav dest[sizeof(dest)-1] = 0; 566b7579f77SDag-Erling Smørgrav port = ntohs(((struct sockaddr_in*)addr)->sin_port); 567b7579f77SDag-Erling Smørgrav dname_str(zone, namebuf); 568b7579f77SDag-Erling Smørgrav if(af != AF_INET && af != AF_INET6) 569b7579f77SDag-Erling Smørgrav verbose(v, "%s <%s> %s%s#%d (addrlen %d)", 570b7579f77SDag-Erling Smørgrav str, namebuf, family, dest, (int)port, (int)addrlen); 571b7579f77SDag-Erling Smørgrav else verbose(v, "%s <%s> %s%s#%d", 572b7579f77SDag-Erling Smørgrav str, namebuf, family, dest, (int)port); 573b7579f77SDag-Erling Smørgrav } 574b7579f77SDag-Erling Smørgrav 575ff825849SDag-Erling Smørgrav void log_err_addr(const char* str, const char* err, 576ff825849SDag-Erling Smørgrav struct sockaddr_storage* addr, socklen_t addrlen) 577ff825849SDag-Erling Smørgrav { 578ff825849SDag-Erling Smørgrav uint16_t port; 579ff825849SDag-Erling Smørgrav char dest[100]; 580ff825849SDag-Erling Smørgrav int af = (int)((struct sockaddr_in*)addr)->sin_family; 581ff825849SDag-Erling Smørgrav void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr; 582ff825849SDag-Erling Smørgrav if(af == AF_INET6) 583ff825849SDag-Erling Smørgrav sinaddr = &((struct sockaddr_in6*)addr)->sin6_addr; 584ff825849SDag-Erling Smørgrav if(inet_ntop(af, sinaddr, dest, (socklen_t)sizeof(dest)) == 0) { 585ff825849SDag-Erling Smørgrav (void)strlcpy(dest, "(inet_ntop error)", sizeof(dest)); 586ff825849SDag-Erling Smørgrav } 587ff825849SDag-Erling Smørgrav dest[sizeof(dest)-1] = 0; 588ff825849SDag-Erling Smørgrav port = ntohs(((struct sockaddr_in*)addr)->sin_port); 589ff825849SDag-Erling Smørgrav if(verbosity >= 4) 590ff825849SDag-Erling Smørgrav log_err("%s: %s for %s port %d (len %d)", str, err, dest, 591ff825849SDag-Erling Smørgrav (int)port, (int)addrlen); 5924c75e3aaSDag-Erling Smørgrav else log_err("%s: %s for %s port %d", str, err, dest, (int)port); 593ff825849SDag-Erling Smørgrav } 594ff825849SDag-Erling Smørgrav 595b7579f77SDag-Erling Smørgrav int 596b7579f77SDag-Erling Smørgrav sockaddr_cmp(struct sockaddr_storage* addr1, socklen_t len1, 597b7579f77SDag-Erling Smørgrav struct sockaddr_storage* addr2, socklen_t len2) 598b7579f77SDag-Erling Smørgrav { 599b7579f77SDag-Erling Smørgrav struct sockaddr_in* p1_in = (struct sockaddr_in*)addr1; 600b7579f77SDag-Erling Smørgrav struct sockaddr_in* p2_in = (struct sockaddr_in*)addr2; 601b7579f77SDag-Erling Smørgrav struct sockaddr_in6* p1_in6 = (struct sockaddr_in6*)addr1; 602b7579f77SDag-Erling Smørgrav struct sockaddr_in6* p2_in6 = (struct sockaddr_in6*)addr2; 603b7579f77SDag-Erling Smørgrav if(len1 < len2) 604b7579f77SDag-Erling Smørgrav return -1; 605b7579f77SDag-Erling Smørgrav if(len1 > len2) 606b7579f77SDag-Erling Smørgrav return 1; 607b7579f77SDag-Erling Smørgrav log_assert(len1 == len2); 608b7579f77SDag-Erling Smørgrav if( p1_in->sin_family < p2_in->sin_family) 609b7579f77SDag-Erling Smørgrav return -1; 610b7579f77SDag-Erling Smørgrav if( p1_in->sin_family > p2_in->sin_family) 611b7579f77SDag-Erling Smørgrav return 1; 612b7579f77SDag-Erling Smørgrav log_assert( p1_in->sin_family == p2_in->sin_family ); 613b7579f77SDag-Erling Smørgrav /* compare ip4 */ 614b7579f77SDag-Erling Smørgrav if( p1_in->sin_family == AF_INET ) { 615b7579f77SDag-Erling Smørgrav /* just order it, ntohs not required */ 616b7579f77SDag-Erling Smørgrav if(p1_in->sin_port < p2_in->sin_port) 617b7579f77SDag-Erling Smørgrav return -1; 618b7579f77SDag-Erling Smørgrav if(p1_in->sin_port > p2_in->sin_port) 619b7579f77SDag-Erling Smørgrav return 1; 620b7579f77SDag-Erling Smørgrav log_assert(p1_in->sin_port == p2_in->sin_port); 621b7579f77SDag-Erling Smørgrav return memcmp(&p1_in->sin_addr, &p2_in->sin_addr, INET_SIZE); 622b7579f77SDag-Erling Smørgrav } else if (p1_in6->sin6_family == AF_INET6) { 623b7579f77SDag-Erling Smørgrav /* just order it, ntohs not required */ 624b7579f77SDag-Erling Smørgrav if(p1_in6->sin6_port < p2_in6->sin6_port) 625b7579f77SDag-Erling Smørgrav return -1; 626b7579f77SDag-Erling Smørgrav if(p1_in6->sin6_port > p2_in6->sin6_port) 627b7579f77SDag-Erling Smørgrav return 1; 628b7579f77SDag-Erling Smørgrav log_assert(p1_in6->sin6_port == p2_in6->sin6_port); 629b7579f77SDag-Erling Smørgrav return memcmp(&p1_in6->sin6_addr, &p2_in6->sin6_addr, 630b7579f77SDag-Erling Smørgrav INET6_SIZE); 631b7579f77SDag-Erling Smørgrav } else { 632b7579f77SDag-Erling Smørgrav /* eek unknown type, perform this comparison for sanity. */ 633b7579f77SDag-Erling Smørgrav return memcmp(addr1, addr2, len1); 634b7579f77SDag-Erling Smørgrav } 635b7579f77SDag-Erling Smørgrav } 636b7579f77SDag-Erling Smørgrav 637b7579f77SDag-Erling Smørgrav int 638b7579f77SDag-Erling Smørgrav sockaddr_cmp_addr(struct sockaddr_storage* addr1, socklen_t len1, 639b7579f77SDag-Erling Smørgrav struct sockaddr_storage* addr2, socklen_t len2) 640b7579f77SDag-Erling Smørgrav { 641b7579f77SDag-Erling Smørgrav struct sockaddr_in* p1_in = (struct sockaddr_in*)addr1; 642b7579f77SDag-Erling Smørgrav struct sockaddr_in* p2_in = (struct sockaddr_in*)addr2; 643b7579f77SDag-Erling Smørgrav struct sockaddr_in6* p1_in6 = (struct sockaddr_in6*)addr1; 644b7579f77SDag-Erling Smørgrav struct sockaddr_in6* p2_in6 = (struct sockaddr_in6*)addr2; 645b7579f77SDag-Erling Smørgrav if(len1 < len2) 646b7579f77SDag-Erling Smørgrav return -1; 647b7579f77SDag-Erling Smørgrav if(len1 > len2) 648b7579f77SDag-Erling Smørgrav return 1; 649b7579f77SDag-Erling Smørgrav log_assert(len1 == len2); 650b7579f77SDag-Erling Smørgrav if( p1_in->sin_family < p2_in->sin_family) 651b7579f77SDag-Erling Smørgrav return -1; 652b7579f77SDag-Erling Smørgrav if( p1_in->sin_family > p2_in->sin_family) 653b7579f77SDag-Erling Smørgrav return 1; 654b7579f77SDag-Erling Smørgrav log_assert( p1_in->sin_family == p2_in->sin_family ); 655b7579f77SDag-Erling Smørgrav /* compare ip4 */ 656b7579f77SDag-Erling Smørgrav if( p1_in->sin_family == AF_INET ) { 657b7579f77SDag-Erling Smørgrav return memcmp(&p1_in->sin_addr, &p2_in->sin_addr, INET_SIZE); 658b7579f77SDag-Erling Smørgrav } else if (p1_in6->sin6_family == AF_INET6) { 659b7579f77SDag-Erling Smørgrav return memcmp(&p1_in6->sin6_addr, &p2_in6->sin6_addr, 660b7579f77SDag-Erling Smørgrav INET6_SIZE); 661b7579f77SDag-Erling Smørgrav } else { 662b7579f77SDag-Erling Smørgrav /* eek unknown type, perform this comparison for sanity. */ 663b7579f77SDag-Erling Smørgrav return memcmp(addr1, addr2, len1); 664b7579f77SDag-Erling Smørgrav } 665b7579f77SDag-Erling Smørgrav } 666b7579f77SDag-Erling Smørgrav 667b7579f77SDag-Erling Smørgrav int 668b7579f77SDag-Erling Smørgrav addr_is_ip6(struct sockaddr_storage* addr, socklen_t len) 669b7579f77SDag-Erling Smørgrav { 670b7579f77SDag-Erling Smørgrav if(len == (socklen_t)sizeof(struct sockaddr_in6) && 671b7579f77SDag-Erling Smørgrav ((struct sockaddr_in6*)addr)->sin6_family == AF_INET6) 672b7579f77SDag-Erling Smørgrav return 1; 673b7579f77SDag-Erling Smørgrav else return 0; 674b7579f77SDag-Erling Smørgrav } 675b7579f77SDag-Erling Smørgrav 676b7579f77SDag-Erling Smørgrav void 677b7579f77SDag-Erling Smørgrav addr_mask(struct sockaddr_storage* addr, socklen_t len, int net) 678b7579f77SDag-Erling Smørgrav { 679b7579f77SDag-Erling Smørgrav uint8_t mask[8] = {0x0, 0x80, 0xc0, 0xe0, 0xf0, 0xf8, 0xfc, 0xfe}; 680b7579f77SDag-Erling Smørgrav int i, max; 681b7579f77SDag-Erling Smørgrav uint8_t* s; 682b7579f77SDag-Erling Smørgrav if(addr_is_ip6(addr, len)) { 683b7579f77SDag-Erling Smørgrav s = (uint8_t*)&((struct sockaddr_in6*)addr)->sin6_addr; 684b7579f77SDag-Erling Smørgrav max = 128; 685b7579f77SDag-Erling Smørgrav } else { 686b7579f77SDag-Erling Smørgrav s = (uint8_t*)&((struct sockaddr_in*)addr)->sin_addr; 687b7579f77SDag-Erling Smørgrav max = 32; 688b7579f77SDag-Erling Smørgrav } 689b7579f77SDag-Erling Smørgrav if(net >= max) 690b7579f77SDag-Erling Smørgrav return; 691b7579f77SDag-Erling Smørgrav for(i=net/8+1; i<max/8; i++) { 692b7579f77SDag-Erling Smørgrav s[i] = 0; 693b7579f77SDag-Erling Smørgrav } 694b7579f77SDag-Erling Smørgrav s[net/8] &= mask[net&0x7]; 695b7579f77SDag-Erling Smørgrav } 696b7579f77SDag-Erling Smørgrav 697b7579f77SDag-Erling Smørgrav int 698b7579f77SDag-Erling Smørgrav addr_in_common(struct sockaddr_storage* addr1, int net1, 699b7579f77SDag-Erling Smørgrav struct sockaddr_storage* addr2, int net2, socklen_t addrlen) 700b7579f77SDag-Erling Smørgrav { 701b7579f77SDag-Erling Smørgrav int min = (net1<net2)?net1:net2; 702b7579f77SDag-Erling Smørgrav int i, to; 703b7579f77SDag-Erling Smørgrav int match = 0; 704b7579f77SDag-Erling Smørgrav uint8_t* s1, *s2; 705b7579f77SDag-Erling Smørgrav if(addr_is_ip6(addr1, addrlen)) { 706b7579f77SDag-Erling Smørgrav s1 = (uint8_t*)&((struct sockaddr_in6*)addr1)->sin6_addr; 707b7579f77SDag-Erling Smørgrav s2 = (uint8_t*)&((struct sockaddr_in6*)addr2)->sin6_addr; 708b7579f77SDag-Erling Smørgrav to = 16; 709b7579f77SDag-Erling Smørgrav } else { 710b7579f77SDag-Erling Smørgrav s1 = (uint8_t*)&((struct sockaddr_in*)addr1)->sin_addr; 711b7579f77SDag-Erling Smørgrav s2 = (uint8_t*)&((struct sockaddr_in*)addr2)->sin_addr; 712b7579f77SDag-Erling Smørgrav to = 4; 713b7579f77SDag-Erling Smørgrav } 714b7579f77SDag-Erling Smørgrav /* match = bits_in_common(s1, s2, to); */ 715b7579f77SDag-Erling Smørgrav for(i=0; i<to; i++) { 716b7579f77SDag-Erling Smørgrav if(s1[i] == s2[i]) { 717b7579f77SDag-Erling Smørgrav match += 8; 718b7579f77SDag-Erling Smørgrav } else { 719b7579f77SDag-Erling Smørgrav uint8_t z = s1[i]^s2[i]; 720b7579f77SDag-Erling Smørgrav log_assert(z); 721b7579f77SDag-Erling Smørgrav while(!(z&0x80)) { 722b7579f77SDag-Erling Smørgrav match++; 723b7579f77SDag-Erling Smørgrav z<<=1; 724b7579f77SDag-Erling Smørgrav } 725b7579f77SDag-Erling Smørgrav break; 726b7579f77SDag-Erling Smørgrav } 727b7579f77SDag-Erling Smørgrav } 728b7579f77SDag-Erling Smørgrav if(match > min) match = min; 729b7579f77SDag-Erling Smørgrav return match; 730b7579f77SDag-Erling Smørgrav } 731b7579f77SDag-Erling Smørgrav 732b7579f77SDag-Erling Smørgrav void 733b7579f77SDag-Erling Smørgrav addr_to_str(struct sockaddr_storage* addr, socklen_t addrlen, 734b7579f77SDag-Erling Smørgrav char* buf, size_t len) 735b7579f77SDag-Erling Smørgrav { 736b7579f77SDag-Erling Smørgrav int af = (int)((struct sockaddr_in*)addr)->sin_family; 737b7579f77SDag-Erling Smørgrav void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr; 738b7579f77SDag-Erling Smørgrav if(addr_is_ip6(addr, addrlen)) 739b7579f77SDag-Erling Smørgrav sinaddr = &((struct sockaddr_in6*)addr)->sin6_addr; 740b7579f77SDag-Erling Smørgrav if(inet_ntop(af, sinaddr, buf, (socklen_t)len) == 0) { 741b7579f77SDag-Erling Smørgrav snprintf(buf, len, "(inet_ntop_error)"); 742b7579f77SDag-Erling Smørgrav } 743b7579f77SDag-Erling Smørgrav } 744b7579f77SDag-Erling Smørgrav 745b7579f77SDag-Erling Smørgrav int 746b7579f77SDag-Erling Smørgrav addr_is_ip4mapped(struct sockaddr_storage* addr, socklen_t addrlen) 747b7579f77SDag-Erling Smørgrav { 748b7579f77SDag-Erling Smørgrav /* prefix for ipv4 into ipv6 mapping is ::ffff:x.x.x.x */ 749b7579f77SDag-Erling Smørgrav const uint8_t map_prefix[16] = 750b7579f77SDag-Erling Smørgrav {0,0,0,0, 0,0,0,0, 0,0,0xff,0xff, 0,0,0,0}; 751b7579f77SDag-Erling Smørgrav uint8_t* s; 752b7579f77SDag-Erling Smørgrav if(!addr_is_ip6(addr, addrlen)) 753b7579f77SDag-Erling Smørgrav return 0; 754b7579f77SDag-Erling Smørgrav /* s is 16 octet ipv6 address string */ 755b7579f77SDag-Erling Smørgrav s = (uint8_t*)&((struct sockaddr_in6*)addr)->sin6_addr; 756b7579f77SDag-Erling Smørgrav return (memcmp(s, map_prefix, 12) == 0); 757b7579f77SDag-Erling Smørgrav } 758b7579f77SDag-Erling Smørgrav 759b7579f77SDag-Erling Smørgrav int addr_is_broadcast(struct sockaddr_storage* addr, socklen_t addrlen) 760b7579f77SDag-Erling Smørgrav { 761b7579f77SDag-Erling Smørgrav int af = (int)((struct sockaddr_in*)addr)->sin_family; 762b7579f77SDag-Erling Smørgrav void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr; 763b7579f77SDag-Erling Smørgrav return af == AF_INET && addrlen>=(socklen_t)sizeof(struct sockaddr_in) 764b7579f77SDag-Erling Smørgrav && memcmp(sinaddr, "\377\377\377\377", 4) == 0; 765b7579f77SDag-Erling Smørgrav } 766b7579f77SDag-Erling Smørgrav 767b7579f77SDag-Erling Smørgrav int addr_is_any(struct sockaddr_storage* addr, socklen_t addrlen) 768b7579f77SDag-Erling Smørgrav { 769b7579f77SDag-Erling Smørgrav int af = (int)((struct sockaddr_in*)addr)->sin_family; 770b7579f77SDag-Erling Smørgrav void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr; 771b7579f77SDag-Erling Smørgrav void* sin6addr = &((struct sockaddr_in6*)addr)->sin6_addr; 772b7579f77SDag-Erling Smørgrav if(af == AF_INET && addrlen>=(socklen_t)sizeof(struct sockaddr_in) 773b7579f77SDag-Erling Smørgrav && memcmp(sinaddr, "\000\000\000\000", 4) == 0) 774b7579f77SDag-Erling Smørgrav return 1; 775b7579f77SDag-Erling Smørgrav else if(af==AF_INET6 && addrlen>=(socklen_t)sizeof(struct sockaddr_in6) 776b7579f77SDag-Erling Smørgrav && memcmp(sin6addr, "\000\000\000\000\000\000\000\000" 777b7579f77SDag-Erling Smørgrav "\000\000\000\000\000\000\000\000", 16) == 0) 778b7579f77SDag-Erling Smørgrav return 1; 779b7579f77SDag-Erling Smørgrav return 0; 780b7579f77SDag-Erling Smørgrav } 781b7579f77SDag-Erling Smørgrav 782b7579f77SDag-Erling Smørgrav void sock_list_insert(struct sock_list** list, struct sockaddr_storage* addr, 783b7579f77SDag-Erling Smørgrav socklen_t len, struct regional* region) 784b7579f77SDag-Erling Smørgrav { 785b7579f77SDag-Erling Smørgrav struct sock_list* add = (struct sock_list*)regional_alloc(region, 786b7579f77SDag-Erling Smørgrav sizeof(*add) - sizeof(add->addr) + (size_t)len); 787b7579f77SDag-Erling Smørgrav if(!add) { 788b7579f77SDag-Erling Smørgrav log_err("out of memory in socketlist insert"); 789b7579f77SDag-Erling Smørgrav return; 790b7579f77SDag-Erling Smørgrav } 791b7579f77SDag-Erling Smørgrav log_assert(list); 792b7579f77SDag-Erling Smørgrav add->next = *list; 793b7579f77SDag-Erling Smørgrav add->len = len; 794b7579f77SDag-Erling Smørgrav *list = add; 795b7579f77SDag-Erling Smørgrav if(len) memmove(&add->addr, addr, len); 796b7579f77SDag-Erling Smørgrav } 797b7579f77SDag-Erling Smørgrav 798b7579f77SDag-Erling Smørgrav void sock_list_prepend(struct sock_list** list, struct sock_list* add) 799b7579f77SDag-Erling Smørgrav { 800b7579f77SDag-Erling Smørgrav struct sock_list* last = add; 801b7579f77SDag-Erling Smørgrav if(!last) 802b7579f77SDag-Erling Smørgrav return; 803b7579f77SDag-Erling Smørgrav while(last->next) 804b7579f77SDag-Erling Smørgrav last = last->next; 805b7579f77SDag-Erling Smørgrav last->next = *list; 806b7579f77SDag-Erling Smørgrav *list = add; 807b7579f77SDag-Erling Smørgrav } 808b7579f77SDag-Erling Smørgrav 809b7579f77SDag-Erling Smørgrav int sock_list_find(struct sock_list* list, struct sockaddr_storage* addr, 810b7579f77SDag-Erling Smørgrav socklen_t len) 811b7579f77SDag-Erling Smørgrav { 812b7579f77SDag-Erling Smørgrav while(list) { 813b7579f77SDag-Erling Smørgrav if(len == list->len) { 814b7579f77SDag-Erling Smørgrav if(len == 0 || sockaddr_cmp_addr(addr, len, 815b7579f77SDag-Erling Smørgrav &list->addr, list->len) == 0) 816b7579f77SDag-Erling Smørgrav return 1; 817b7579f77SDag-Erling Smørgrav } 818b7579f77SDag-Erling Smørgrav list = list->next; 819b7579f77SDag-Erling Smørgrav } 820b7579f77SDag-Erling Smørgrav return 0; 821b7579f77SDag-Erling Smørgrav } 822b7579f77SDag-Erling Smørgrav 823b7579f77SDag-Erling Smørgrav void sock_list_merge(struct sock_list** list, struct regional* region, 824b7579f77SDag-Erling Smørgrav struct sock_list* add) 825b7579f77SDag-Erling Smørgrav { 826b7579f77SDag-Erling Smørgrav struct sock_list* p; 827b7579f77SDag-Erling Smørgrav for(p=add; p; p=p->next) { 828b7579f77SDag-Erling Smørgrav if(!sock_list_find(*list, &p->addr, p->len)) 829b7579f77SDag-Erling Smørgrav sock_list_insert(list, &p->addr, p->len, region); 830b7579f77SDag-Erling Smørgrav } 831b7579f77SDag-Erling Smørgrav } 832b7579f77SDag-Erling Smørgrav 833b7579f77SDag-Erling Smørgrav void 834b7579f77SDag-Erling Smørgrav log_crypto_err(const char* str) 835b7579f77SDag-Erling Smørgrav { 8368ed2b524SDag-Erling Smørgrav #ifdef HAVE_SSL 8370eefd307SCy Schubert log_crypto_err_code(str, ERR_get_error()); 8380eefd307SCy Schubert #else 8390eefd307SCy Schubert (void)str; 8400eefd307SCy Schubert #endif /* HAVE_SSL */ 8410eefd307SCy Schubert } 8420eefd307SCy Schubert 8430eefd307SCy Schubert void log_crypto_err_code(const char* str, unsigned long err) 8440eefd307SCy Schubert { 8450eefd307SCy Schubert #ifdef HAVE_SSL 846b7579f77SDag-Erling Smørgrav /* error:[error code]:[library name]:[function name]:[reason string] */ 847b7579f77SDag-Erling Smørgrav char buf[128]; 848b7579f77SDag-Erling Smørgrav unsigned long e; 8490eefd307SCy Schubert ERR_error_string_n(err, buf, sizeof(buf)); 850b7579f77SDag-Erling Smørgrav log_err("%s crypto %s", str, buf); 851b7579f77SDag-Erling Smørgrav while( (e=ERR_get_error()) ) { 852b7579f77SDag-Erling Smørgrav ERR_error_string_n(e, buf, sizeof(buf)); 853b7579f77SDag-Erling Smørgrav log_err("and additionally crypto %s", buf); 854b7579f77SDag-Erling Smørgrav } 8558ed2b524SDag-Erling Smørgrav #else 8568ed2b524SDag-Erling Smørgrav (void)str; 8570eefd307SCy Schubert (void)err; 8588ed2b524SDag-Erling Smørgrav #endif /* HAVE_SSL */ 859b7579f77SDag-Erling Smørgrav } 860b7579f77SDag-Erling Smørgrav 861*25039b37SCy Schubert #ifdef HAVE_SSL 862*25039b37SCy Schubert /** log certificate details */ 863*25039b37SCy Schubert void 864*25039b37SCy Schubert log_cert(unsigned level, const char* str, void* cert) 865*25039b37SCy Schubert { 866*25039b37SCy Schubert BIO* bio; 867*25039b37SCy Schubert char nul = 0; 868*25039b37SCy Schubert char* pp = NULL; 869*25039b37SCy Schubert long len; 870*25039b37SCy Schubert if(verbosity < level) return; 871*25039b37SCy Schubert bio = BIO_new(BIO_s_mem()); 872*25039b37SCy Schubert if(!bio) return; 873*25039b37SCy Schubert X509_print_ex(bio, (X509*)cert, 0, (unsigned long)-1 874*25039b37SCy Schubert ^(X509_FLAG_NO_SUBJECT 875*25039b37SCy Schubert |X509_FLAG_NO_ISSUER|X509_FLAG_NO_VALIDITY 876*25039b37SCy Schubert |X509_FLAG_NO_EXTENSIONS|X509_FLAG_NO_AUX 877*25039b37SCy Schubert |X509_FLAG_NO_ATTRIBUTES)); 878*25039b37SCy Schubert BIO_write(bio, &nul, (int)sizeof(nul)); 879*25039b37SCy Schubert len = BIO_get_mem_data(bio, &pp); 880*25039b37SCy Schubert if(len != 0 && pp) { 881*25039b37SCy Schubert verbose(level, "%s: \n%s", str, pp); 882*25039b37SCy Schubert } 883*25039b37SCy Schubert BIO_free(bio); 884*25039b37SCy Schubert } 885*25039b37SCy Schubert #endif /* HAVE_SSL */ 886*25039b37SCy Schubert 887971980c3SDag-Erling Smørgrav int 888971980c3SDag-Erling Smørgrav listen_sslctx_setup(void* ctxt) 889971980c3SDag-Erling Smørgrav { 890971980c3SDag-Erling Smørgrav #ifdef HAVE_SSL 891971980c3SDag-Erling Smørgrav SSL_CTX* ctx = (SSL_CTX*)ctxt; 892971980c3SDag-Erling Smørgrav /* no SSLv2, SSLv3 because has defects */ 893091e9e46SCy Schubert #if SSL_OP_NO_SSLv2 != 0 894971980c3SDag-Erling Smørgrav if((SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv2) & SSL_OP_NO_SSLv2) 895971980c3SDag-Erling Smørgrav != SSL_OP_NO_SSLv2){ 896971980c3SDag-Erling Smørgrav log_crypto_err("could not set SSL_OP_NO_SSLv2"); 897971980c3SDag-Erling Smørgrav return 0; 898971980c3SDag-Erling Smørgrav } 899091e9e46SCy Schubert #endif 900971980c3SDag-Erling Smørgrav if((SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv3) & SSL_OP_NO_SSLv3) 901971980c3SDag-Erling Smørgrav != SSL_OP_NO_SSLv3){ 902971980c3SDag-Erling Smørgrav log_crypto_err("could not set SSL_OP_NO_SSLv3"); 903971980c3SDag-Erling Smørgrav return 0; 904971980c3SDag-Erling Smørgrav } 905971980c3SDag-Erling Smørgrav #if defined(SSL_OP_NO_TLSv1) && defined(SSL_OP_NO_TLSv1_1) 906971980c3SDag-Erling Smørgrav /* if we have tls 1.1 disable 1.0 */ 907971980c3SDag-Erling Smørgrav if((SSL_CTX_set_options(ctx, SSL_OP_NO_TLSv1) & SSL_OP_NO_TLSv1) 908971980c3SDag-Erling Smørgrav != SSL_OP_NO_TLSv1){ 909971980c3SDag-Erling Smørgrav log_crypto_err("could not set SSL_OP_NO_TLSv1"); 910971980c3SDag-Erling Smørgrav return 0; 911971980c3SDag-Erling Smørgrav } 912971980c3SDag-Erling Smørgrav #endif 913971980c3SDag-Erling Smørgrav #if defined(SSL_OP_NO_TLSv1_1) && defined(SSL_OP_NO_TLSv1_2) 914971980c3SDag-Erling Smørgrav /* if we have tls 1.2 disable 1.1 */ 915971980c3SDag-Erling Smørgrav if((SSL_CTX_set_options(ctx, SSL_OP_NO_TLSv1_1) & SSL_OP_NO_TLSv1_1) 916971980c3SDag-Erling Smørgrav != SSL_OP_NO_TLSv1_1){ 917971980c3SDag-Erling Smørgrav log_crypto_err("could not set SSL_OP_NO_TLSv1_1"); 918971980c3SDag-Erling Smørgrav return 0; 919971980c3SDag-Erling Smørgrav } 920971980c3SDag-Erling Smørgrav #endif 9210eefd307SCy Schubert #if defined(SSL_OP_NO_RENEGOTIATION) 9220eefd307SCy Schubert /* disable client renegotiation */ 9230eefd307SCy Schubert if((SSL_CTX_set_options(ctx, SSL_OP_NO_RENEGOTIATION) & 9240eefd307SCy Schubert SSL_OP_NO_RENEGOTIATION) != SSL_OP_NO_RENEGOTIATION) { 9250eefd307SCy Schubert log_crypto_err("could not set SSL_OP_NO_RENEGOTIATION"); 9260eefd307SCy Schubert return 0; 9270eefd307SCy Schubert } 9280eefd307SCy Schubert #endif 929971980c3SDag-Erling Smørgrav #if defined(SHA256_DIGEST_LENGTH) && defined(USE_ECDSA) 930971980c3SDag-Erling Smørgrav /* if we have sha256, set the cipher list to have no known vulns */ 93157bddd21SDag-Erling Smørgrav if(!SSL_CTX_set_cipher_list(ctx, "TLS13-CHACHA20-POLY1305-SHA256:TLS13-AES-256-GCM-SHA384:TLS13-AES-128-GCM-SHA256:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256")) 932971980c3SDag-Erling Smørgrav log_crypto_err("could not set cipher list with SSL_CTX_set_cipher_list"); 933971980c3SDag-Erling Smørgrav #endif 934971980c3SDag-Erling Smørgrav 935971980c3SDag-Erling Smørgrav if((SSL_CTX_set_options(ctx, SSL_OP_CIPHER_SERVER_PREFERENCE) & 936971980c3SDag-Erling Smørgrav SSL_OP_CIPHER_SERVER_PREFERENCE) != 937971980c3SDag-Erling Smørgrav SSL_OP_CIPHER_SERVER_PREFERENCE) { 938971980c3SDag-Erling Smørgrav log_crypto_err("could not set SSL_OP_CIPHER_SERVER_PREFERENCE"); 939971980c3SDag-Erling Smørgrav return 0; 940971980c3SDag-Erling Smørgrav } 941971980c3SDag-Erling Smørgrav 942971980c3SDag-Erling Smørgrav #ifdef HAVE_SSL_CTX_SET_SECURITY_LEVEL 943971980c3SDag-Erling Smørgrav SSL_CTX_set_security_level(ctx, 0); 944971980c3SDag-Erling Smørgrav #endif 945971980c3SDag-Erling Smørgrav #else 946971980c3SDag-Erling Smørgrav (void)ctxt; 947971980c3SDag-Erling Smørgrav #endif /* HAVE_SSL */ 948971980c3SDag-Erling Smørgrav return 1; 949971980c3SDag-Erling Smørgrav } 950971980c3SDag-Erling Smørgrav 951971980c3SDag-Erling Smørgrav void 952971980c3SDag-Erling Smørgrav listen_sslctx_setup_2(void* ctxt) 953971980c3SDag-Erling Smørgrav { 954971980c3SDag-Erling Smørgrav #ifdef HAVE_SSL 955971980c3SDag-Erling Smørgrav SSL_CTX* ctx = (SSL_CTX*)ctxt; 956971980c3SDag-Erling Smørgrav (void)ctx; 957971980c3SDag-Erling Smørgrav #if HAVE_DECL_SSL_CTX_SET_ECDH_AUTO 958971980c3SDag-Erling Smørgrav if(!SSL_CTX_set_ecdh_auto(ctx,1)) { 959971980c3SDag-Erling Smørgrav log_crypto_err("Error in SSL_CTX_ecdh_auto, not enabling ECDHE"); 960971980c3SDag-Erling Smørgrav } 961971980c3SDag-Erling Smørgrav #elif defined(USE_ECDSA) 962971980c3SDag-Erling Smørgrav if(1) { 963971980c3SDag-Erling Smørgrav EC_KEY *ecdh = EC_KEY_new_by_curve_name (NID_X9_62_prime256v1); 964971980c3SDag-Erling Smørgrav if (!ecdh) { 965971980c3SDag-Erling Smørgrav log_crypto_err("could not find p256, not enabling ECDHE"); 966971980c3SDag-Erling Smørgrav } else { 967971980c3SDag-Erling Smørgrav if (1 != SSL_CTX_set_tmp_ecdh (ctx, ecdh)) { 968971980c3SDag-Erling Smørgrav log_crypto_err("Error in SSL_CTX_set_tmp_ecdh, not enabling ECDHE"); 969971980c3SDag-Erling Smørgrav } 970971980c3SDag-Erling Smørgrav EC_KEY_free (ecdh); 971971980c3SDag-Erling Smørgrav } 972971980c3SDag-Erling Smørgrav } 973971980c3SDag-Erling Smørgrav #endif 974971980c3SDag-Erling Smørgrav #else 975971980c3SDag-Erling Smørgrav (void)ctxt; 976971980c3SDag-Erling Smørgrav #endif /* HAVE_SSL */ 977971980c3SDag-Erling Smørgrav } 978971980c3SDag-Erling Smørgrav 979b7579f77SDag-Erling Smørgrav void* listen_sslctx_create(char* key, char* pem, char* verifypem) 980b7579f77SDag-Erling Smørgrav { 9818ed2b524SDag-Erling Smørgrav #ifdef HAVE_SSL 982b7579f77SDag-Erling Smørgrav SSL_CTX* ctx = SSL_CTX_new(SSLv23_server_method()); 983b7579f77SDag-Erling Smørgrav if(!ctx) { 984b7579f77SDag-Erling Smørgrav log_crypto_err("could not SSL_CTX_new"); 985b7579f77SDag-Erling Smørgrav return NULL; 986b7579f77SDag-Erling Smørgrav } 987e86b9096SDag-Erling Smørgrav if(!key || key[0] == 0) { 988e86b9096SDag-Erling Smørgrav log_err("error: no tls-service-key file specified"); 989e86b9096SDag-Erling Smørgrav SSL_CTX_free(ctx); 990e86b9096SDag-Erling Smørgrav return NULL; 991e86b9096SDag-Erling Smørgrav } 992e86b9096SDag-Erling Smørgrav if(!pem || pem[0] == 0) { 993e86b9096SDag-Erling Smørgrav log_err("error: no tls-service-pem file specified"); 994e86b9096SDag-Erling Smørgrav SSL_CTX_free(ctx); 995e86b9096SDag-Erling Smørgrav return NULL; 996e86b9096SDag-Erling Smørgrav } 997971980c3SDag-Erling Smørgrav if(!listen_sslctx_setup(ctx)) { 998ff825849SDag-Erling Smørgrav SSL_CTX_free(ctx); 999ff825849SDag-Erling Smørgrav return NULL; 1000ff825849SDag-Erling Smørgrav } 1001b75612f8SDag-Erling Smørgrav if(!SSL_CTX_use_certificate_chain_file(ctx, pem)) { 1002b7579f77SDag-Erling Smørgrav log_err("error for cert file: %s", pem); 1003b75612f8SDag-Erling Smørgrav log_crypto_err("error in SSL_CTX use_certificate_chain_file"); 1004b7579f77SDag-Erling Smørgrav SSL_CTX_free(ctx); 1005b7579f77SDag-Erling Smørgrav return NULL; 1006b7579f77SDag-Erling Smørgrav } 1007b7579f77SDag-Erling Smørgrav if(!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM)) { 1008b7579f77SDag-Erling Smørgrav log_err("error for private key file: %s", key); 1009b7579f77SDag-Erling Smørgrav log_crypto_err("Error in SSL_CTX use_PrivateKey_file"); 1010b7579f77SDag-Erling Smørgrav SSL_CTX_free(ctx); 1011b7579f77SDag-Erling Smørgrav return NULL; 1012b7579f77SDag-Erling Smørgrav } 1013b7579f77SDag-Erling Smørgrav if(!SSL_CTX_check_private_key(ctx)) { 1014b7579f77SDag-Erling Smørgrav log_err("error for key file: %s", key); 1015b7579f77SDag-Erling Smørgrav log_crypto_err("Error in SSL_CTX check_private_key"); 1016b7579f77SDag-Erling Smørgrav SSL_CTX_free(ctx); 1017b7579f77SDag-Erling Smørgrav return NULL; 1018b7579f77SDag-Erling Smørgrav } 1019971980c3SDag-Erling Smørgrav listen_sslctx_setup_2(ctx); 1020b7579f77SDag-Erling Smørgrav if(verifypem && verifypem[0]) { 1021b7579f77SDag-Erling Smørgrav if(!SSL_CTX_load_verify_locations(ctx, verifypem, NULL)) { 1022b7579f77SDag-Erling Smørgrav log_crypto_err("Error in SSL_CTX verify locations"); 1023b7579f77SDag-Erling Smørgrav SSL_CTX_free(ctx); 1024b7579f77SDag-Erling Smørgrav return NULL; 1025b7579f77SDag-Erling Smørgrav } 1026b7579f77SDag-Erling Smørgrav SSL_CTX_set_client_CA_list(ctx, SSL_load_client_CA_file( 1027b7579f77SDag-Erling Smørgrav verifypem)); 1028*25039b37SCy Schubert SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER|SSL_VERIFY_FAIL_IF_NO_PEER_CERT, NULL); 1029b7579f77SDag-Erling Smørgrav } 1030b7579f77SDag-Erling Smørgrav return ctx; 10318ed2b524SDag-Erling Smørgrav #else 10328ed2b524SDag-Erling Smørgrav (void)key; (void)pem; (void)verifypem; 10338ed2b524SDag-Erling Smørgrav return NULL; 10348ed2b524SDag-Erling Smørgrav #endif 1035b7579f77SDag-Erling Smørgrav } 1036b7579f77SDag-Erling Smørgrav 10373bd4df0aSDag-Erling Smørgrav #ifdef USE_WINSOCK 10383bd4df0aSDag-Erling Smørgrav /* For windows, the CA trust store is not read by openssl. 10393bd4df0aSDag-Erling Smørgrav Add code to open the trust store using wincrypt API and add 10403bd4df0aSDag-Erling Smørgrav the root certs into openssl trust store */ 10413bd4df0aSDag-Erling Smørgrav static int 10423bd4df0aSDag-Erling Smørgrav add_WIN_cacerts_to_openssl_store(SSL_CTX* tls_ctx) 10433bd4df0aSDag-Erling Smørgrav { 10443bd4df0aSDag-Erling Smørgrav HCERTSTORE hSystemStore; 10453bd4df0aSDag-Erling Smørgrav PCCERT_CONTEXT pTargetCert = NULL; 10463bd4df0aSDag-Erling Smørgrav X509_STORE* store; 10473bd4df0aSDag-Erling Smørgrav 10483bd4df0aSDag-Erling Smørgrav verbose(VERB_ALGO, "Adding Windows certificates from system root store to CA store"); 10493bd4df0aSDag-Erling Smørgrav 10503bd4df0aSDag-Erling Smørgrav /* load just once per context lifetime for this version 10513bd4df0aSDag-Erling Smørgrav TODO: dynamically update CA trust changes as they are available */ 10523bd4df0aSDag-Erling Smørgrav if (!tls_ctx) 10533bd4df0aSDag-Erling Smørgrav return 0; 10543bd4df0aSDag-Erling Smørgrav 10553bd4df0aSDag-Erling Smørgrav /* Call wincrypt's CertOpenStore to open the CA root store. */ 10563bd4df0aSDag-Erling Smørgrav 10573bd4df0aSDag-Erling Smørgrav if ((hSystemStore = CertOpenStore( 10583bd4df0aSDag-Erling Smørgrav CERT_STORE_PROV_SYSTEM, 10593bd4df0aSDag-Erling Smørgrav 0, 10603bd4df0aSDag-Erling Smørgrav 0, 10613bd4df0aSDag-Erling Smørgrav /* NOTE: mingw does not have this const: replace with 1 << 16 from code 10623bd4df0aSDag-Erling Smørgrav CERT_SYSTEM_STORE_CURRENT_USER, */ 10633bd4df0aSDag-Erling Smørgrav 1 << 16, 10643bd4df0aSDag-Erling Smørgrav L"root")) == 0) 10653bd4df0aSDag-Erling Smørgrav { 10663bd4df0aSDag-Erling Smørgrav return 0; 10673bd4df0aSDag-Erling Smørgrav } 10683bd4df0aSDag-Erling Smørgrav 10693bd4df0aSDag-Erling Smørgrav store = SSL_CTX_get_cert_store(tls_ctx); 10703bd4df0aSDag-Erling Smørgrav if (!store) 10713bd4df0aSDag-Erling Smørgrav return 0; 10723bd4df0aSDag-Erling Smørgrav 10733bd4df0aSDag-Erling Smørgrav /* failure if the CA store is empty or the call fails */ 10743bd4df0aSDag-Erling Smørgrav if ((pTargetCert = CertEnumCertificatesInStore( 10753bd4df0aSDag-Erling Smørgrav hSystemStore, pTargetCert)) == 0) { 10763bd4df0aSDag-Erling Smørgrav verbose(VERB_ALGO, "CA certificate store for Windows is empty."); 10773bd4df0aSDag-Erling Smørgrav return 0; 10783bd4df0aSDag-Erling Smørgrav } 10793bd4df0aSDag-Erling Smørgrav /* iterate over the windows cert store and add to openssl store */ 10803bd4df0aSDag-Erling Smørgrav do 10813bd4df0aSDag-Erling Smørgrav { 10823bd4df0aSDag-Erling Smørgrav X509 *cert1 = d2i_X509(NULL, 10833bd4df0aSDag-Erling Smørgrav (const unsigned char **)&pTargetCert->pbCertEncoded, 10843bd4df0aSDag-Erling Smørgrav pTargetCert->cbCertEncoded); 10853bd4df0aSDag-Erling Smørgrav if (!cert1) { 10863bd4df0aSDag-Erling Smørgrav /* return error if a cert fails */ 10873bd4df0aSDag-Erling Smørgrav verbose(VERB_ALGO, "%s %d:%s", 10883bd4df0aSDag-Erling Smørgrav "Unable to parse certificate in memory", 10893bd4df0aSDag-Erling Smørgrav (int)ERR_get_error(), ERR_error_string(ERR_get_error(), NULL)); 10903bd4df0aSDag-Erling Smørgrav return 0; 10913bd4df0aSDag-Erling Smørgrav } 10923bd4df0aSDag-Erling Smørgrav else { 10933bd4df0aSDag-Erling Smørgrav /* return error if a cert add to store fails */ 10943bd4df0aSDag-Erling Smørgrav if (X509_STORE_add_cert(store, cert1) == 0) { 10953bd4df0aSDag-Erling Smørgrav unsigned long error = ERR_peek_last_error(); 10963bd4df0aSDag-Erling Smørgrav 10973bd4df0aSDag-Erling Smørgrav /* Ignore error X509_R_CERT_ALREADY_IN_HASH_TABLE which means the 10983bd4df0aSDag-Erling Smørgrav * certificate is already in the store. */ 10993bd4df0aSDag-Erling Smørgrav if(ERR_GET_LIB(error) != ERR_LIB_X509 || 11003bd4df0aSDag-Erling Smørgrav ERR_GET_REASON(error) != X509_R_CERT_ALREADY_IN_HASH_TABLE) { 11013bd4df0aSDag-Erling Smørgrav verbose(VERB_ALGO, "%s %d:%s\n", 11023bd4df0aSDag-Erling Smørgrav "Error adding certificate", (int)ERR_get_error(), 11033bd4df0aSDag-Erling Smørgrav ERR_error_string(ERR_get_error(), NULL)); 11043bd4df0aSDag-Erling Smørgrav X509_free(cert1); 11053bd4df0aSDag-Erling Smørgrav return 0; 11063bd4df0aSDag-Erling Smørgrav } 11073bd4df0aSDag-Erling Smørgrav } 11083bd4df0aSDag-Erling Smørgrav X509_free(cert1); 11093bd4df0aSDag-Erling Smørgrav } 11103bd4df0aSDag-Erling Smørgrav } while ((pTargetCert = CertEnumCertificatesInStore( 11113bd4df0aSDag-Erling Smørgrav hSystemStore, pTargetCert)) != 0); 11123bd4df0aSDag-Erling Smørgrav 11133bd4df0aSDag-Erling Smørgrav /* Clean up memory and quit. */ 11143bd4df0aSDag-Erling Smørgrav if (pTargetCert) 11153bd4df0aSDag-Erling Smørgrav CertFreeCertificateContext(pTargetCert); 11163bd4df0aSDag-Erling Smørgrav if (hSystemStore) 11173bd4df0aSDag-Erling Smørgrav { 11183bd4df0aSDag-Erling Smørgrav if (!CertCloseStore( 11193bd4df0aSDag-Erling Smørgrav hSystemStore, 0)) 11203bd4df0aSDag-Erling Smørgrav return 0; 11213bd4df0aSDag-Erling Smørgrav } 11223bd4df0aSDag-Erling Smørgrav verbose(VERB_ALGO, "Completed adding Windows certificates to CA store successfully"); 11233bd4df0aSDag-Erling Smørgrav return 1; 11243bd4df0aSDag-Erling Smørgrav } 11253bd4df0aSDag-Erling Smørgrav #endif /* USE_WINSOCK */ 11263bd4df0aSDag-Erling Smørgrav 11273bd4df0aSDag-Erling Smørgrav void* connect_sslctx_create(char* key, char* pem, char* verifypem, int wincert) 1128b7579f77SDag-Erling Smørgrav { 11298ed2b524SDag-Erling Smørgrav #ifdef HAVE_SSL 1130b7579f77SDag-Erling Smørgrav SSL_CTX* ctx = SSL_CTX_new(SSLv23_client_method()); 1131b7579f77SDag-Erling Smørgrav if(!ctx) { 1132b7579f77SDag-Erling Smørgrav log_crypto_err("could not allocate SSL_CTX pointer"); 1133b7579f77SDag-Erling Smørgrav return NULL; 1134b7579f77SDag-Erling Smørgrav } 1135091e9e46SCy Schubert #if SSL_OP_NO_SSLv2 != 0 113605ab2901SDag-Erling Smørgrav if((SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv2) & SSL_OP_NO_SSLv2) 113705ab2901SDag-Erling Smørgrav != SSL_OP_NO_SSLv2) { 1138b7579f77SDag-Erling Smørgrav log_crypto_err("could not set SSL_OP_NO_SSLv2"); 1139b7579f77SDag-Erling Smørgrav SSL_CTX_free(ctx); 1140b7579f77SDag-Erling Smørgrav return NULL; 1141b7579f77SDag-Erling Smørgrav } 1142091e9e46SCy Schubert #endif 114305ab2901SDag-Erling Smørgrav if((SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv3) & SSL_OP_NO_SSLv3) 114405ab2901SDag-Erling Smørgrav != SSL_OP_NO_SSLv3) { 1145ff825849SDag-Erling Smørgrav log_crypto_err("could not set SSL_OP_NO_SSLv3"); 1146ff825849SDag-Erling Smørgrav SSL_CTX_free(ctx); 1147ff825849SDag-Erling Smørgrav return NULL; 1148ff825849SDag-Erling Smørgrav } 11490eefd307SCy Schubert #if defined(SSL_OP_NO_RENEGOTIATION) 11500eefd307SCy Schubert /* disable client renegotiation */ 11510eefd307SCy Schubert if((SSL_CTX_set_options(ctx, SSL_OP_NO_RENEGOTIATION) & 11520eefd307SCy Schubert SSL_OP_NO_RENEGOTIATION) != SSL_OP_NO_RENEGOTIATION) { 11530eefd307SCy Schubert log_crypto_err("could not set SSL_OP_NO_RENEGOTIATION"); 11540eefd307SCy Schubert return 0; 11550eefd307SCy Schubert } 11560eefd307SCy Schubert #endif 1157b7579f77SDag-Erling Smørgrav if(key && key[0]) { 1158b75612f8SDag-Erling Smørgrav if(!SSL_CTX_use_certificate_chain_file(ctx, pem)) { 1159b7579f77SDag-Erling Smørgrav log_err("error in client certificate %s", pem); 1160b7579f77SDag-Erling Smørgrav log_crypto_err("error in certificate file"); 1161b7579f77SDag-Erling Smørgrav SSL_CTX_free(ctx); 1162b7579f77SDag-Erling Smørgrav return NULL; 1163b7579f77SDag-Erling Smørgrav } 1164b7579f77SDag-Erling Smørgrav if(!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM)) { 1165b7579f77SDag-Erling Smørgrav log_err("error in client private key %s", key); 1166b7579f77SDag-Erling Smørgrav log_crypto_err("error in key file"); 1167b7579f77SDag-Erling Smørgrav SSL_CTX_free(ctx); 1168b7579f77SDag-Erling Smørgrav return NULL; 1169b7579f77SDag-Erling Smørgrav } 1170b7579f77SDag-Erling Smørgrav if(!SSL_CTX_check_private_key(ctx)) { 1171b7579f77SDag-Erling Smørgrav log_err("error in client key %s", key); 1172b7579f77SDag-Erling Smørgrav log_crypto_err("error in SSL_CTX_check_private_key"); 1173b7579f77SDag-Erling Smørgrav SSL_CTX_free(ctx); 1174b7579f77SDag-Erling Smørgrav return NULL; 1175b7579f77SDag-Erling Smørgrav } 1176b7579f77SDag-Erling Smørgrav } 11773bd4df0aSDag-Erling Smørgrav if((verifypem && verifypem[0]) || wincert) { 1178b7579f77SDag-Erling Smørgrav if(verifypem && verifypem[0]) { 1179ff825849SDag-Erling Smørgrav if(!SSL_CTX_load_verify_locations(ctx, verifypem, NULL)) { 1180b7579f77SDag-Erling Smørgrav log_crypto_err("error in SSL_CTX verify"); 1181b7579f77SDag-Erling Smørgrav SSL_CTX_free(ctx); 1182b7579f77SDag-Erling Smørgrav return NULL; 1183b7579f77SDag-Erling Smørgrav } 11843bd4df0aSDag-Erling Smørgrav } 11853bd4df0aSDag-Erling Smørgrav #ifdef USE_WINSOCK 11863bd4df0aSDag-Erling Smørgrav if(wincert) { 11873bd4df0aSDag-Erling Smørgrav if(!add_WIN_cacerts_to_openssl_store(ctx)) { 11883bd4df0aSDag-Erling Smørgrav log_crypto_err("error in add_WIN_cacerts_to_openssl_store"); 11893bd4df0aSDag-Erling Smørgrav SSL_CTX_free(ctx); 11903bd4df0aSDag-Erling Smørgrav return NULL; 11913bd4df0aSDag-Erling Smørgrav } 11923bd4df0aSDag-Erling Smørgrav } 11933bd4df0aSDag-Erling Smørgrav #else 11943bd4df0aSDag-Erling Smørgrav (void)wincert; 11953bd4df0aSDag-Erling Smørgrav #endif 1196b7579f77SDag-Erling Smørgrav SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, NULL); 1197b7579f77SDag-Erling Smørgrav } 1198b7579f77SDag-Erling Smørgrav return ctx; 11998ed2b524SDag-Erling Smørgrav #else 12003bd4df0aSDag-Erling Smørgrav (void)key; (void)pem; (void)verifypem; (void)wincert; 12018ed2b524SDag-Erling Smørgrav return NULL; 12028ed2b524SDag-Erling Smørgrav #endif 1203b7579f77SDag-Erling Smørgrav } 1204b7579f77SDag-Erling Smørgrav 1205b7579f77SDag-Erling Smørgrav void* incoming_ssl_fd(void* sslctx, int fd) 1206b7579f77SDag-Erling Smørgrav { 12078ed2b524SDag-Erling Smørgrav #ifdef HAVE_SSL 1208b7579f77SDag-Erling Smørgrav SSL* ssl = SSL_new((SSL_CTX*)sslctx); 1209b7579f77SDag-Erling Smørgrav if(!ssl) { 1210b7579f77SDag-Erling Smørgrav log_crypto_err("could not SSL_new"); 1211b7579f77SDag-Erling Smørgrav return NULL; 1212b7579f77SDag-Erling Smørgrav } 1213b7579f77SDag-Erling Smørgrav SSL_set_accept_state(ssl); 12140eefd307SCy Schubert (void)SSL_set_mode(ssl, (long)SSL_MODE_AUTO_RETRY); 1215b7579f77SDag-Erling Smørgrav if(!SSL_set_fd(ssl, fd)) { 1216b7579f77SDag-Erling Smørgrav log_crypto_err("could not SSL_set_fd"); 1217b7579f77SDag-Erling Smørgrav SSL_free(ssl); 1218b7579f77SDag-Erling Smørgrav return NULL; 1219b7579f77SDag-Erling Smørgrav } 1220b7579f77SDag-Erling Smørgrav return ssl; 12218ed2b524SDag-Erling Smørgrav #else 12228ed2b524SDag-Erling Smørgrav (void)sslctx; (void)fd; 12238ed2b524SDag-Erling Smørgrav return NULL; 12248ed2b524SDag-Erling Smørgrav #endif 1225b7579f77SDag-Erling Smørgrav } 1226b7579f77SDag-Erling Smørgrav 1227b7579f77SDag-Erling Smørgrav void* outgoing_ssl_fd(void* sslctx, int fd) 1228b7579f77SDag-Erling Smørgrav { 12298ed2b524SDag-Erling Smørgrav #ifdef HAVE_SSL 1230b7579f77SDag-Erling Smørgrav SSL* ssl = SSL_new((SSL_CTX*)sslctx); 1231b7579f77SDag-Erling Smørgrav if(!ssl) { 1232b7579f77SDag-Erling Smørgrav log_crypto_err("could not SSL_new"); 1233b7579f77SDag-Erling Smørgrav return NULL; 1234b7579f77SDag-Erling Smørgrav } 1235b7579f77SDag-Erling Smørgrav SSL_set_connect_state(ssl); 12360eefd307SCy Schubert (void)SSL_set_mode(ssl, (long)SSL_MODE_AUTO_RETRY); 1237b7579f77SDag-Erling Smørgrav if(!SSL_set_fd(ssl, fd)) { 1238b7579f77SDag-Erling Smørgrav log_crypto_err("could not SSL_set_fd"); 1239b7579f77SDag-Erling Smørgrav SSL_free(ssl); 1240b7579f77SDag-Erling Smørgrav return NULL; 1241b7579f77SDag-Erling Smørgrav } 1242b7579f77SDag-Erling Smørgrav return ssl; 12438ed2b524SDag-Erling Smørgrav #else 12448ed2b524SDag-Erling Smørgrav (void)sslctx; (void)fd; 12458ed2b524SDag-Erling Smørgrav return NULL; 12468ed2b524SDag-Erling Smørgrav #endif 1247b7579f77SDag-Erling Smørgrav } 12488ed2b524SDag-Erling Smørgrav 1249*25039b37SCy Schubert int check_auth_name_for_ssl(char* auth_name) 1250*25039b37SCy Schubert { 1251*25039b37SCy Schubert if(!auth_name) return 1; 1252*25039b37SCy Schubert #if defined(HAVE_SSL) && !defined(HAVE_SSL_SET1_HOST) && !defined(HAVE_X509_VERIFY_PARAM_SET1_HOST) 1253*25039b37SCy Schubert log_err("the query has an auth_name %s, but libssl has no call to " 1254*25039b37SCy Schubert "perform TLS authentication. Remove that name from config " 1255*25039b37SCy Schubert "or upgrade the ssl crypto library.", auth_name); 1256*25039b37SCy Schubert return 0; 1257*25039b37SCy Schubert #else 1258*25039b37SCy Schubert return 1; 1259*25039b37SCy Schubert #endif 1260*25039b37SCy Schubert } 1261*25039b37SCy Schubert 1262*25039b37SCy Schubert /** set the authname on an SSL structure, SSL* ssl */ 1263*25039b37SCy Schubert int set_auth_name_on_ssl(void* ssl, char* auth_name, int use_sni) 1264*25039b37SCy Schubert { 1265*25039b37SCy Schubert if(!auth_name) return 1; 1266*25039b37SCy Schubert #ifdef HAVE_SSL 1267*25039b37SCy Schubert if(use_sni) { 1268*25039b37SCy Schubert (void)SSL_set_tlsext_host_name(ssl, auth_name); 1269*25039b37SCy Schubert } 1270*25039b37SCy Schubert #else 1271*25039b37SCy Schubert (void)ssl; 1272*25039b37SCy Schubert (void)use_sni; 1273*25039b37SCy Schubert #endif 1274*25039b37SCy Schubert #ifdef HAVE_SSL_SET1_HOST 1275*25039b37SCy Schubert SSL_set_verify(ssl, SSL_VERIFY_PEER, NULL); 1276*25039b37SCy Schubert /* setting the hostname makes openssl verify the 1277*25039b37SCy Schubert * host name in the x509 certificate in the 1278*25039b37SCy Schubert * SSL connection*/ 1279*25039b37SCy Schubert if(!SSL_set1_host(ssl, auth_name)) { 1280*25039b37SCy Schubert log_err("SSL_set1_host failed"); 1281*25039b37SCy Schubert return 0; 1282*25039b37SCy Schubert } 1283*25039b37SCy Schubert #elif defined(HAVE_X509_VERIFY_PARAM_SET1_HOST) 1284*25039b37SCy Schubert /* openssl 1.0.2 has this function that can be used for 1285*25039b37SCy Schubert * set1_host like verification */ 1286*25039b37SCy Schubert if(auth_name) { 1287*25039b37SCy Schubert X509_VERIFY_PARAM* param = SSL_get0_param(ssl); 1288*25039b37SCy Schubert # ifdef X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS 1289*25039b37SCy Schubert X509_VERIFY_PARAM_set_hostflags(param, X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS); 1290*25039b37SCy Schubert # endif 1291*25039b37SCy Schubert if(!X509_VERIFY_PARAM_set1_host(param, auth_name, strlen(auth_name))) { 1292*25039b37SCy Schubert log_err("X509_VERIFY_PARAM_set1_host failed"); 1293*25039b37SCy Schubert return 0; 1294*25039b37SCy Schubert } 1295*25039b37SCy Schubert SSL_set_verify(ssl, SSL_VERIFY_PEER, NULL); 1296*25039b37SCy Schubert } 1297*25039b37SCy Schubert #else 1298*25039b37SCy Schubert verbose(VERB_ALGO, "the query has an auth_name, but libssl has no call to perform TLS authentication"); 1299*25039b37SCy Schubert #endif /* HAVE_SSL_SET1_HOST */ 1300*25039b37SCy Schubert return 1; 1301*25039b37SCy Schubert } 1302*25039b37SCy Schubert 1303b5663de9SDag-Erling Smørgrav #if defined(HAVE_SSL) && defined(OPENSSL_THREADS) && !defined(THREADS_DISABLED) && defined(CRYPTO_LOCK) && OPENSSL_VERSION_NUMBER < 0x10100000L 13048ed2b524SDag-Erling Smørgrav /** global lock list for openssl locks */ 13053005e0a3SDag-Erling Smørgrav static lock_basic_type *ub_openssl_locks = NULL; 13068ed2b524SDag-Erling Smørgrav 13078ed2b524SDag-Erling Smørgrav /** callback that gets thread id for openssl */ 1308e86b9096SDag-Erling Smørgrav #ifdef HAVE_CRYPTO_THREADID_SET_CALLBACK 1309e86b9096SDag-Erling Smørgrav static void 1310e86b9096SDag-Erling Smørgrav ub_crypto_id_cb(CRYPTO_THREADID *id) 1311e86b9096SDag-Erling Smørgrav { 1312e86b9096SDag-Erling Smørgrav CRYPTO_THREADID_set_numeric(id, (unsigned long)log_thread_get()); 1313e86b9096SDag-Erling Smørgrav } 1314e86b9096SDag-Erling Smørgrav #else 13158ed2b524SDag-Erling Smørgrav static unsigned long 13168ed2b524SDag-Erling Smørgrav ub_crypto_id_cb(void) 13178ed2b524SDag-Erling Smørgrav { 131809a3aaf3SDag-Erling Smørgrav return (unsigned long)log_thread_get(); 13198ed2b524SDag-Erling Smørgrav } 1320e86b9096SDag-Erling Smørgrav #endif 13218ed2b524SDag-Erling Smørgrav 13228ed2b524SDag-Erling Smørgrav static void 13238ed2b524SDag-Erling Smørgrav ub_crypto_lock_cb(int mode, int type, const char *ATTR_UNUSED(file), 13248ed2b524SDag-Erling Smørgrav int ATTR_UNUSED(line)) 13258ed2b524SDag-Erling Smørgrav { 13268ed2b524SDag-Erling Smørgrav if((mode&CRYPTO_LOCK)) { 13278ed2b524SDag-Erling Smørgrav lock_basic_lock(&ub_openssl_locks[type]); 13288ed2b524SDag-Erling Smørgrav } else { 13298ed2b524SDag-Erling Smørgrav lock_basic_unlock(&ub_openssl_locks[type]); 13308ed2b524SDag-Erling Smørgrav } 13318ed2b524SDag-Erling Smørgrav } 13328ed2b524SDag-Erling Smørgrav #endif /* OPENSSL_THREADS */ 13338ed2b524SDag-Erling Smørgrav 13348ed2b524SDag-Erling Smørgrav int ub_openssl_lock_init(void) 13358ed2b524SDag-Erling Smørgrav { 1336b5663de9SDag-Erling Smørgrav #if defined(HAVE_SSL) && defined(OPENSSL_THREADS) && !defined(THREADS_DISABLED) && defined(CRYPTO_LOCK) && OPENSSL_VERSION_NUMBER < 0x10100000L 13378ed2b524SDag-Erling Smørgrav int i; 13383005e0a3SDag-Erling Smørgrav ub_openssl_locks = (lock_basic_type*)reallocarray( 13393005e0a3SDag-Erling Smørgrav NULL, (size_t)CRYPTO_num_locks(), sizeof(lock_basic_type)); 13408ed2b524SDag-Erling Smørgrav if(!ub_openssl_locks) 13418ed2b524SDag-Erling Smørgrav return 0; 13428ed2b524SDag-Erling Smørgrav for(i=0; i<CRYPTO_num_locks(); i++) { 13438ed2b524SDag-Erling Smørgrav lock_basic_init(&ub_openssl_locks[i]); 13448ed2b524SDag-Erling Smørgrav } 1345e86b9096SDag-Erling Smørgrav # ifdef HAVE_CRYPTO_THREADID_SET_CALLBACK 1346e86b9096SDag-Erling Smørgrav CRYPTO_THREADID_set_callback(&ub_crypto_id_cb); 1347e86b9096SDag-Erling Smørgrav # else 13488ed2b524SDag-Erling Smørgrav CRYPTO_set_id_callback(&ub_crypto_id_cb); 1349e86b9096SDag-Erling Smørgrav # endif 13508ed2b524SDag-Erling Smørgrav CRYPTO_set_locking_callback(&ub_crypto_lock_cb); 13518ed2b524SDag-Erling Smørgrav #endif /* OPENSSL_THREADS */ 13528ed2b524SDag-Erling Smørgrav return 1; 13538ed2b524SDag-Erling Smørgrav } 13548ed2b524SDag-Erling Smørgrav 13558ed2b524SDag-Erling Smørgrav void ub_openssl_lock_delete(void) 13568ed2b524SDag-Erling Smørgrav { 1357b5663de9SDag-Erling Smørgrav #if defined(HAVE_SSL) && defined(OPENSSL_THREADS) && !defined(THREADS_DISABLED) && defined(CRYPTO_LOCK) && OPENSSL_VERSION_NUMBER < 0x10100000L 13588ed2b524SDag-Erling Smørgrav int i; 13598ed2b524SDag-Erling Smørgrav if(!ub_openssl_locks) 13608ed2b524SDag-Erling Smørgrav return; 1361e86b9096SDag-Erling Smørgrav # ifdef HAVE_CRYPTO_THREADID_SET_CALLBACK 1362e86b9096SDag-Erling Smørgrav CRYPTO_THREADID_set_callback(NULL); 1363e86b9096SDag-Erling Smørgrav # else 13648ed2b524SDag-Erling Smørgrav CRYPTO_set_id_callback(NULL); 1365e86b9096SDag-Erling Smørgrav # endif 13668ed2b524SDag-Erling Smørgrav CRYPTO_set_locking_callback(NULL); 13678ed2b524SDag-Erling Smørgrav for(i=0; i<CRYPTO_num_locks(); i++) { 13688ed2b524SDag-Erling Smørgrav lock_basic_destroy(&ub_openssl_locks[i]); 13698ed2b524SDag-Erling Smørgrav } 13708ed2b524SDag-Erling Smørgrav free(ub_openssl_locks); 13718ed2b524SDag-Erling Smørgrav #endif /* OPENSSL_THREADS */ 13728ed2b524SDag-Erling Smørgrav } 13738ed2b524SDag-Erling Smørgrav 1374e86b9096SDag-Erling Smørgrav int listen_sslctx_setup_ticket_keys(void* sslctx, struct config_strlist* tls_session_ticket_keys) { 1375e86b9096SDag-Erling Smørgrav #ifdef HAVE_SSL 1376e86b9096SDag-Erling Smørgrav size_t s = 1; 1377e86b9096SDag-Erling Smørgrav struct config_strlist* p; 1378e86b9096SDag-Erling Smørgrav struct tls_session_ticket_key *keys; 1379e86b9096SDag-Erling Smørgrav for(p = tls_session_ticket_keys; p; p = p->next) { 1380e86b9096SDag-Erling Smørgrav s++; 1381e86b9096SDag-Erling Smørgrav } 1382e86b9096SDag-Erling Smørgrav keys = calloc(s, sizeof(struct tls_session_ticket_key)); 1383091e9e46SCy Schubert if(!keys) 1384091e9e46SCy Schubert return 0; 1385e86b9096SDag-Erling Smørgrav memset(keys, 0, s*sizeof(*keys)); 1386e86b9096SDag-Erling Smørgrav ticket_keys = keys; 1387e86b9096SDag-Erling Smørgrav 1388e86b9096SDag-Erling Smørgrav for(p = tls_session_ticket_keys; p; p = p->next) { 1389e86b9096SDag-Erling Smørgrav size_t n; 1390091e9e46SCy Schubert unsigned char *data; 1391091e9e46SCy Schubert FILE *f; 1392091e9e46SCy Schubert 1393091e9e46SCy Schubert data = (unsigned char *)malloc(80); 1394091e9e46SCy Schubert if(!data) 1395091e9e46SCy Schubert return 0; 1396091e9e46SCy Schubert 1397*25039b37SCy Schubert f = fopen(p->str, "rb"); 1398e86b9096SDag-Erling Smørgrav if(!f) { 1399e86b9096SDag-Erling Smørgrav log_err("could not read tls-session-ticket-key %s: %s", p->str, strerror(errno)); 1400e86b9096SDag-Erling Smørgrav free(data); 1401e86b9096SDag-Erling Smørgrav return 0; 1402e86b9096SDag-Erling Smørgrav } 1403e86b9096SDag-Erling Smørgrav n = fread(data, 1, 80, f); 1404e86b9096SDag-Erling Smørgrav fclose(f); 1405e86b9096SDag-Erling Smørgrav 1406e86b9096SDag-Erling Smørgrav if(n != 80) { 1407e86b9096SDag-Erling Smørgrav log_err("tls-session-ticket-key %s is %d bytes, must be 80 bytes", p->str, (int)n); 1408e86b9096SDag-Erling Smørgrav free(data); 1409e86b9096SDag-Erling Smørgrav return 0; 1410e86b9096SDag-Erling Smørgrav } 1411e86b9096SDag-Erling Smørgrav verbose(VERB_OPS, "read tls-session-ticket-key: %s", p->str); 1412e86b9096SDag-Erling Smørgrav 1413e86b9096SDag-Erling Smørgrav keys->key_name = data; 1414e86b9096SDag-Erling Smørgrav keys->aes_key = data + 16; 1415e86b9096SDag-Erling Smørgrav keys->hmac_key = data + 48; 1416e86b9096SDag-Erling Smørgrav keys++; 1417e86b9096SDag-Erling Smørgrav } 1418e86b9096SDag-Erling Smørgrav /* terminate array with NULL key name entry */ 1419e86b9096SDag-Erling Smørgrav keys->key_name = NULL; 1420*25039b37SCy Schubert # ifdef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB 1421*25039b37SCy Schubert if(SSL_CTX_set_tlsext_ticket_key_evp_cb(sslctx, tls_session_ticket_key_cb) == 0) { 1422*25039b37SCy Schubert log_err("no support for TLS session ticket"); 1423*25039b37SCy Schubert return 0; 1424*25039b37SCy Schubert } 1425*25039b37SCy Schubert # else 1426e86b9096SDag-Erling Smørgrav if(SSL_CTX_set_tlsext_ticket_key_cb(sslctx, tls_session_ticket_key_cb) == 0) { 1427e86b9096SDag-Erling Smørgrav log_err("no support for TLS session ticket"); 1428e86b9096SDag-Erling Smørgrav return 0; 1429e86b9096SDag-Erling Smørgrav } 1430*25039b37SCy Schubert # endif 1431e86b9096SDag-Erling Smørgrav return 1; 1432e86b9096SDag-Erling Smørgrav #else 1433e86b9096SDag-Erling Smørgrav (void)sslctx; 1434e86b9096SDag-Erling Smørgrav (void)tls_session_ticket_keys; 1435e86b9096SDag-Erling Smørgrav return 0; 1436e86b9096SDag-Erling Smørgrav #endif 1437e86b9096SDag-Erling Smørgrav 1438e86b9096SDag-Erling Smørgrav } 1439e86b9096SDag-Erling Smørgrav 1440*25039b37SCy Schubert #ifdef HAVE_SSL 1441*25039b37SCy Schubert int tls_session_ticket_key_cb(SSL *ATTR_UNUSED(sslctx), unsigned char* key_name, 1442*25039b37SCy Schubert unsigned char* iv, EVP_CIPHER_CTX *evp_sctx, 1443*25039b37SCy Schubert #ifdef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB 1444*25039b37SCy Schubert EVP_MAC_CTX *hmac_ctx, 1445*25039b37SCy Schubert #else 1446*25039b37SCy Schubert HMAC_CTX* hmac_ctx, 1447*25039b37SCy Schubert #endif 1448*25039b37SCy Schubert int enc) 1449e86b9096SDag-Erling Smørgrav { 1450e86b9096SDag-Erling Smørgrav #ifdef HAVE_SSL 1451*25039b37SCy Schubert # ifdef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB 1452*25039b37SCy Schubert OSSL_PARAM params[3]; 1453*25039b37SCy Schubert # else 1454e86b9096SDag-Erling Smørgrav const EVP_MD *digest; 1455*25039b37SCy Schubert # endif 1456e86b9096SDag-Erling Smørgrav const EVP_CIPHER *cipher; 1457e86b9096SDag-Erling Smørgrav int evp_cipher_length; 1458*25039b37SCy Schubert # ifndef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB 1459e86b9096SDag-Erling Smørgrav digest = EVP_sha256(); 1460*25039b37SCy Schubert # endif 1461e86b9096SDag-Erling Smørgrav cipher = EVP_aes_256_cbc(); 1462e86b9096SDag-Erling Smørgrav evp_cipher_length = EVP_CIPHER_iv_length(cipher); 1463e86b9096SDag-Erling Smørgrav if( enc == 1 ) { 1464e86b9096SDag-Erling Smørgrav /* encrypt */ 1465e86b9096SDag-Erling Smørgrav verbose(VERB_CLIENT, "start session encrypt"); 1466e86b9096SDag-Erling Smørgrav memcpy(key_name, ticket_keys->key_name, 16); 1467e86b9096SDag-Erling Smørgrav if (RAND_bytes(iv, evp_cipher_length) != 1) { 1468e86b9096SDag-Erling Smørgrav verbose(VERB_CLIENT, "RAND_bytes failed"); 1469e86b9096SDag-Erling Smørgrav return -1; 1470e86b9096SDag-Erling Smørgrav } 1471e86b9096SDag-Erling Smørgrav if (EVP_EncryptInit_ex(evp_sctx, cipher, NULL, ticket_keys->aes_key, iv) != 1) { 1472e86b9096SDag-Erling Smørgrav verbose(VERB_CLIENT, "EVP_EncryptInit_ex failed"); 1473e86b9096SDag-Erling Smørgrav return -1; 1474e86b9096SDag-Erling Smørgrav } 1475*25039b37SCy Schubert #ifdef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB 1476*25039b37SCy Schubert params[0] = OSSL_PARAM_construct_octet_string(OSSL_MAC_PARAM_KEY, 1477*25039b37SCy Schubert ticket_keys->hmac_key, 32); 1478*25039b37SCy Schubert params[1] = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_DIGEST, 1479*25039b37SCy Schubert "sha256", 0); 1480*25039b37SCy Schubert params[2] = OSSL_PARAM_construct_end(); 1481*25039b37SCy Schubert EVP_MAC_set_ctx_params(hmac_ctx, params); 1482*25039b37SCy Schubert #elif !defined(HMAC_INIT_EX_RETURNS_VOID) 1483e86b9096SDag-Erling Smørgrav if (HMAC_Init_ex(hmac_ctx, ticket_keys->hmac_key, 32, digest, NULL) != 1) { 1484e86b9096SDag-Erling Smørgrav verbose(VERB_CLIENT, "HMAC_Init_ex failed"); 1485e86b9096SDag-Erling Smørgrav return -1; 1486e86b9096SDag-Erling Smørgrav } 14870eefd307SCy Schubert #else 14880eefd307SCy Schubert HMAC_Init_ex(hmac_ctx, ticket_keys->hmac_key, 32, digest, NULL); 14890eefd307SCy Schubert #endif 1490e86b9096SDag-Erling Smørgrav return 1; 1491e86b9096SDag-Erling Smørgrav } else if (enc == 0) { 1492e86b9096SDag-Erling Smørgrav /* decrypt */ 1493e86b9096SDag-Erling Smørgrav struct tls_session_ticket_key *key; 1494e86b9096SDag-Erling Smørgrav verbose(VERB_CLIENT, "start session decrypt"); 1495e86b9096SDag-Erling Smørgrav for(key = ticket_keys; key->key_name != NULL; key++) { 1496e86b9096SDag-Erling Smørgrav if (!memcmp(key_name, key->key_name, 16)) { 1497e86b9096SDag-Erling Smørgrav verbose(VERB_CLIENT, "Found session_key"); 1498e86b9096SDag-Erling Smørgrav break; 1499e86b9096SDag-Erling Smørgrav } 1500e86b9096SDag-Erling Smørgrav } 1501e86b9096SDag-Erling Smørgrav if(key->key_name == NULL) { 1502e86b9096SDag-Erling Smørgrav verbose(VERB_CLIENT, "Not found session_key"); 1503e86b9096SDag-Erling Smørgrav return 0; 1504e86b9096SDag-Erling Smørgrav } 1505e86b9096SDag-Erling Smørgrav 1506*25039b37SCy Schubert #ifdef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB 1507*25039b37SCy Schubert params[0] = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_KEY, 1508*25039b37SCy Schubert key->hmac_key, 32); 1509*25039b37SCy Schubert params[1] = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_DIGEST, 1510*25039b37SCy Schubert "sha256", 0); 1511*25039b37SCy Schubert params[2] = OSSL_PARAM_construct_end(); 1512*25039b37SCy Schubert EVP_MAC_set_ctx_params(hmac_ctx, params); 1513*25039b37SCy Schubert #elif !defined(HMAC_INIT_EX_RETURNS_VOID) 1514e86b9096SDag-Erling Smørgrav if (HMAC_Init_ex(hmac_ctx, key->hmac_key, 32, digest, NULL) != 1) { 1515e86b9096SDag-Erling Smørgrav verbose(VERB_CLIENT, "HMAC_Init_ex failed"); 1516e86b9096SDag-Erling Smørgrav return -1; 1517e86b9096SDag-Erling Smørgrav } 15180eefd307SCy Schubert #else 15190eefd307SCy Schubert HMAC_Init_ex(hmac_ctx, key->hmac_key, 32, digest, NULL); 15200eefd307SCy Schubert #endif 1521e86b9096SDag-Erling Smørgrav if (EVP_DecryptInit_ex(evp_sctx, cipher, NULL, key->aes_key, iv) != 1) { 1522e86b9096SDag-Erling Smørgrav log_err("EVP_DecryptInit_ex failed"); 1523e86b9096SDag-Erling Smørgrav return -1; 1524e86b9096SDag-Erling Smørgrav } 1525e86b9096SDag-Erling Smørgrav 1526e86b9096SDag-Erling Smørgrav return (key == ticket_keys) ? 1 : 2; 1527e86b9096SDag-Erling Smørgrav } 1528e86b9096SDag-Erling Smørgrav return -1; 1529e86b9096SDag-Erling Smørgrav #else 1530e86b9096SDag-Erling Smørgrav (void)key_name; 1531e86b9096SDag-Erling Smørgrav (void)iv; 1532e86b9096SDag-Erling Smørgrav (void)evp_sctx; 1533e86b9096SDag-Erling Smørgrav (void)hmac_ctx; 1534e86b9096SDag-Erling Smørgrav (void)enc; 1535e86b9096SDag-Erling Smørgrav return 0; 1536e86b9096SDag-Erling Smørgrav #endif 1537e86b9096SDag-Erling Smørgrav } 1538*25039b37SCy Schubert #endif /* HAVE_SSL */ 1539e86b9096SDag-Erling Smørgrav 1540e86b9096SDag-Erling Smørgrav void 1541e86b9096SDag-Erling Smørgrav listen_sslctx_delete_ticket_keys(void) 1542e86b9096SDag-Erling Smørgrav { 1543e86b9096SDag-Erling Smørgrav struct tls_session_ticket_key *key; 1544e86b9096SDag-Erling Smørgrav if(!ticket_keys) return; 1545e86b9096SDag-Erling Smørgrav for(key = ticket_keys; key->key_name != NULL; key++) { 1546e86b9096SDag-Erling Smørgrav /* wipe key data from memory*/ 1547e86b9096SDag-Erling Smørgrav #ifdef HAVE_EXPLICIT_BZERO 1548e86b9096SDag-Erling Smørgrav explicit_bzero(key->key_name, 80); 1549e86b9096SDag-Erling Smørgrav #else 1550e86b9096SDag-Erling Smørgrav memset(key->key_name, 0xdd, 80); 1551e86b9096SDag-Erling Smørgrav #endif 1552e86b9096SDag-Erling Smørgrav free(key->key_name); 1553e86b9096SDag-Erling Smørgrav } 1554e86b9096SDag-Erling Smørgrav free(ticket_keys); 1555e86b9096SDag-Erling Smørgrav ticket_keys = NULL; 1556e86b9096SDag-Erling Smørgrav } 1557