1b7579f77SDag-Erling Smørgrav /* 2b7579f77SDag-Erling Smørgrav * util/net_help.c - implementation of the network helper code 3b7579f77SDag-Erling Smørgrav * 4b7579f77SDag-Erling Smørgrav * Copyright (c) 2007, NLnet Labs. All rights reserved. 5b7579f77SDag-Erling Smørgrav * 6b7579f77SDag-Erling Smørgrav * This software is open source. 7b7579f77SDag-Erling Smørgrav * 8b7579f77SDag-Erling Smørgrav * Redistribution and use in source and binary forms, with or without 9b7579f77SDag-Erling Smørgrav * modification, are permitted provided that the following conditions 10b7579f77SDag-Erling Smørgrav * are met: 11b7579f77SDag-Erling Smørgrav * 12b7579f77SDag-Erling Smørgrav * Redistributions of source code must retain the above copyright notice, 13b7579f77SDag-Erling Smørgrav * this list of conditions and the following disclaimer. 14b7579f77SDag-Erling Smørgrav * 15b7579f77SDag-Erling Smørgrav * Redistributions in binary form must reproduce the above copyright notice, 16b7579f77SDag-Erling Smørgrav * this list of conditions and the following disclaimer in the documentation 17b7579f77SDag-Erling Smørgrav * and/or other materials provided with the distribution. 18b7579f77SDag-Erling Smørgrav * 19b7579f77SDag-Erling Smørgrav * Neither the name of the NLNET LABS nor the names of its contributors may 20b7579f77SDag-Erling Smørgrav * be used to endorse or promote products derived from this software without 21b7579f77SDag-Erling Smørgrav * specific prior written permission. 22b7579f77SDag-Erling Smørgrav * 23b7579f77SDag-Erling Smørgrav * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 2417d15b25SDag-Erling Smørgrav * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 2517d15b25SDag-Erling Smørgrav * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 2617d15b25SDag-Erling Smørgrav * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 2717d15b25SDag-Erling Smørgrav * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 2817d15b25SDag-Erling Smørgrav * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED 2917d15b25SDag-Erling Smørgrav * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 3017d15b25SDag-Erling Smørgrav * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 3117d15b25SDag-Erling Smørgrav * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 3217d15b25SDag-Erling Smørgrav * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 3317d15b25SDag-Erling Smørgrav * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34b7579f77SDag-Erling Smørgrav */ 35b7579f77SDag-Erling Smørgrav /** 36b7579f77SDag-Erling Smørgrav * \file 37b7579f77SDag-Erling Smørgrav * Implementation of net_help.h. 38b7579f77SDag-Erling Smørgrav */ 39b7579f77SDag-Erling Smørgrav 40b7579f77SDag-Erling Smørgrav #include "config.h" 41b7579f77SDag-Erling Smørgrav #include "util/net_help.h" 42b7579f77SDag-Erling Smørgrav #include "util/log.h" 43b7579f77SDag-Erling Smørgrav #include "util/data/dname.h" 44b7579f77SDag-Erling Smørgrav #include "util/module.h" 45b7579f77SDag-Erling Smørgrav #include "util/regional.h" 46e86b9096SDag-Erling Smørgrav #include "util/config_file.h" 4709a3aaf3SDag-Erling Smørgrav #include "sldns/parseutil.h" 4809a3aaf3SDag-Erling Smørgrav #include "sldns/wire2str.h" 49b7579f77SDag-Erling Smørgrav #include <fcntl.h> 508ed2b524SDag-Erling Smørgrav #ifdef HAVE_OPENSSL_SSL_H 51b7579f77SDag-Erling Smørgrav #include <openssl/ssl.h> 52e86b9096SDag-Erling Smørgrav #include <openssl/evp.h> 53e86b9096SDag-Erling Smørgrav #include <openssl/rand.h> 548ed2b524SDag-Erling Smørgrav #endif 558ed2b524SDag-Erling Smørgrav #ifdef HAVE_OPENSSL_ERR_H 56b7579f77SDag-Erling Smørgrav #include <openssl/err.h> 578ed2b524SDag-Erling Smørgrav #endif 5825039b37SCy Schubert #ifdef HAVE_OPENSSL_CORE_NAMES_H 5925039b37SCy Schubert #include <openssl/core_names.h> 6025039b37SCy Schubert #endif 613bd4df0aSDag-Erling Smørgrav #ifdef USE_WINSOCK 623bd4df0aSDag-Erling Smørgrav #include <wincrypt.h> 633bd4df0aSDag-Erling Smørgrav #endif 64*c0caa2e2SCy Schubert #ifdef HAVE_NGHTTP2_NGHTTP2_H 65*c0caa2e2SCy Schubert #include <nghttp2/nghttp2.h> 66*c0caa2e2SCy Schubert #endif 67b7579f77SDag-Erling Smørgrav 68b7579f77SDag-Erling Smørgrav /** max length of an IP address (the address portion) that we allow */ 69b7579f77SDag-Erling Smørgrav #define MAX_ADDR_STRLEN 128 /* characters */ 70b7579f77SDag-Erling Smørgrav /** default value for EDNS ADVERTISED size */ 71b7579f77SDag-Erling Smørgrav uint16_t EDNS_ADVERTISED_SIZE = 4096; 72b7579f77SDag-Erling Smørgrav 73b7579f77SDag-Erling Smørgrav /** minimal responses when positive answer: default is no */ 74b7579f77SDag-Erling Smørgrav int MINIMAL_RESPONSES = 0; 75b7579f77SDag-Erling Smørgrav 7625039b37SCy Schubert /** rrset order roundrobin: default is yes */ 7725039b37SCy Schubert int RRSET_ROUNDROBIN = 1; 78b7579f77SDag-Erling Smørgrav 79e86b9096SDag-Erling Smørgrav /** log tag queries with name instead of 'info' for filtering */ 80e86b9096SDag-Erling Smørgrav int LOG_TAG_QUERYREPLY = 0; 81e86b9096SDag-Erling Smørgrav 82e86b9096SDag-Erling Smørgrav static struct tls_session_ticket_key { 83e86b9096SDag-Erling Smørgrav unsigned char *key_name; 84e86b9096SDag-Erling Smørgrav unsigned char *aes_key; 85e86b9096SDag-Erling Smørgrav unsigned char *hmac_key; 86e86b9096SDag-Erling Smørgrav } *ticket_keys; 87e86b9096SDag-Erling Smørgrav 88*c0caa2e2SCy Schubert #ifdef HAVE_SSL 8925039b37SCy Schubert /** 9025039b37SCy Schubert * callback TLS session ticket encrypt and decrypt 9125039b37SCy Schubert * For use with SSL_CTX_set_tlsext_ticket_key_cb or 9225039b37SCy Schubert * SSL_CTX_set_tlsext_ticket_key_evp_cb 9325039b37SCy Schubert * @param s: the SSL_CTX to use (from connect_sslctx_create()) 9425039b37SCy Schubert * @param key_name: secret name, 16 bytes 9525039b37SCy Schubert * @param iv: up to EVP_MAX_IV_LENGTH. 9625039b37SCy Schubert * @param evp_ctx: the evp cipher context, function sets this. 9725039b37SCy Schubert * @param hmac_ctx: the hmac context, function sets this. 9825039b37SCy Schubert * with ..key_cb it is of type HMAC_CTX* 9925039b37SCy Schubert * with ..key_evp_cb it is of type EVP_MAC_CTX* 10025039b37SCy Schubert * @param enc: 1 is encrypt, 0 is decrypt 10125039b37SCy Schubert * @return 0 on no ticket, 1 for okay, and 2 for okay but renew the ticket 10225039b37SCy Schubert * (the ticket is decrypt only). and <0 for failures. 10325039b37SCy Schubert */ 10425039b37SCy Schubert int tls_session_ticket_key_cb(SSL *s, unsigned char* key_name, 10525039b37SCy Schubert unsigned char* iv, EVP_CIPHER_CTX *evp_ctx, 10625039b37SCy Schubert #ifdef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB 10725039b37SCy Schubert EVP_MAC_CTX *hmac_ctx, 10825039b37SCy Schubert #else 10925039b37SCy Schubert HMAC_CTX* hmac_ctx, 11025039b37SCy Schubert #endif 11125039b37SCy Schubert int enc); 11225039b37SCy Schubert #endif /* HAVE_SSL */ 11325039b37SCy Schubert 114b7579f77SDag-Erling Smørgrav /* returns true is string addr is an ip6 specced address */ 115b7579f77SDag-Erling Smørgrav int 116b7579f77SDag-Erling Smørgrav str_is_ip6(const char* str) 117b7579f77SDag-Erling Smørgrav { 118b7579f77SDag-Erling Smørgrav if(strchr(str, ':')) 119b7579f77SDag-Erling Smørgrav return 1; 120b7579f77SDag-Erling Smørgrav else return 0; 121b7579f77SDag-Erling Smørgrav } 122b7579f77SDag-Erling Smørgrav 123b7579f77SDag-Erling Smørgrav int 124b7579f77SDag-Erling Smørgrav fd_set_nonblock(int s) 125b7579f77SDag-Erling Smørgrav { 126b7579f77SDag-Erling Smørgrav #ifdef HAVE_FCNTL 127b7579f77SDag-Erling Smørgrav int flag; 128b7579f77SDag-Erling Smørgrav if((flag = fcntl(s, F_GETFL)) == -1) { 129b7579f77SDag-Erling Smørgrav log_err("can't fcntl F_GETFL: %s", strerror(errno)); 130b7579f77SDag-Erling Smørgrav flag = 0; 131b7579f77SDag-Erling Smørgrav } 132b7579f77SDag-Erling Smørgrav flag |= O_NONBLOCK; 133b7579f77SDag-Erling Smørgrav if(fcntl(s, F_SETFL, flag) == -1) { 134b7579f77SDag-Erling Smørgrav log_err("can't fcntl F_SETFL: %s", strerror(errno)); 135b7579f77SDag-Erling Smørgrav return 0; 136b7579f77SDag-Erling Smørgrav } 137b7579f77SDag-Erling Smørgrav #elif defined(HAVE_IOCTLSOCKET) 138b7579f77SDag-Erling Smørgrav unsigned long on = 1; 139b7579f77SDag-Erling Smørgrav if(ioctlsocket(s, FIONBIO, &on) != 0) { 140b7579f77SDag-Erling Smørgrav log_err("can't ioctlsocket FIONBIO on: %s", 141b7579f77SDag-Erling Smørgrav wsa_strerror(WSAGetLastError())); 142b7579f77SDag-Erling Smørgrav } 143b7579f77SDag-Erling Smørgrav #endif 144b7579f77SDag-Erling Smørgrav return 1; 145b7579f77SDag-Erling Smørgrav } 146b7579f77SDag-Erling Smørgrav 147b7579f77SDag-Erling Smørgrav int 148b7579f77SDag-Erling Smørgrav fd_set_block(int s) 149b7579f77SDag-Erling Smørgrav { 150b7579f77SDag-Erling Smørgrav #ifdef HAVE_FCNTL 151b7579f77SDag-Erling Smørgrav int flag; 152b7579f77SDag-Erling Smørgrav if((flag = fcntl(s, F_GETFL)) == -1) { 153b7579f77SDag-Erling Smørgrav log_err("cannot fcntl F_GETFL: %s", strerror(errno)); 154b7579f77SDag-Erling Smørgrav flag = 0; 155b7579f77SDag-Erling Smørgrav } 156b7579f77SDag-Erling Smørgrav flag &= ~O_NONBLOCK; 157b7579f77SDag-Erling Smørgrav if(fcntl(s, F_SETFL, flag) == -1) { 158b7579f77SDag-Erling Smørgrav log_err("cannot fcntl F_SETFL: %s", strerror(errno)); 159b7579f77SDag-Erling Smørgrav return 0; 160b7579f77SDag-Erling Smørgrav } 161b7579f77SDag-Erling Smørgrav #elif defined(HAVE_IOCTLSOCKET) 162b7579f77SDag-Erling Smørgrav unsigned long off = 0; 163b7579f77SDag-Erling Smørgrav if(ioctlsocket(s, FIONBIO, &off) != 0) { 164971980c3SDag-Erling Smørgrav if(WSAGetLastError() != WSAEINVAL || verbosity >= 4) 165b7579f77SDag-Erling Smørgrav log_err("can't ioctlsocket FIONBIO off: %s", 166b7579f77SDag-Erling Smørgrav wsa_strerror(WSAGetLastError())); 167b7579f77SDag-Erling Smørgrav } 168b7579f77SDag-Erling Smørgrav #endif 169b7579f77SDag-Erling Smørgrav return 1; 170b7579f77SDag-Erling Smørgrav } 171b7579f77SDag-Erling Smørgrav 172b7579f77SDag-Erling Smørgrav int 173b7579f77SDag-Erling Smørgrav is_pow2(size_t num) 174b7579f77SDag-Erling Smørgrav { 175b7579f77SDag-Erling Smørgrav if(num == 0) return 1; 176b7579f77SDag-Erling Smørgrav return (num & (num-1)) == 0; 177b7579f77SDag-Erling Smørgrav } 178b7579f77SDag-Erling Smørgrav 179b7579f77SDag-Erling Smørgrav void* 180b7579f77SDag-Erling Smørgrav memdup(void* data, size_t len) 181b7579f77SDag-Erling Smørgrav { 182b7579f77SDag-Erling Smørgrav void* d; 183b7579f77SDag-Erling Smørgrav if(!data) return NULL; 184b7579f77SDag-Erling Smørgrav if(len == 0) return NULL; 185b7579f77SDag-Erling Smørgrav d = malloc(len); 186b7579f77SDag-Erling Smørgrav if(!d) return NULL; 187b7579f77SDag-Erling Smørgrav memcpy(d, data, len); 188b7579f77SDag-Erling Smørgrav return d; 189b7579f77SDag-Erling Smørgrav } 190b7579f77SDag-Erling Smørgrav 191b7579f77SDag-Erling Smørgrav void 192b7579f77SDag-Erling Smørgrav log_addr(enum verbosity_value v, const char* str, 193b7579f77SDag-Erling Smørgrav struct sockaddr_storage* addr, socklen_t addrlen) 194b7579f77SDag-Erling Smørgrav { 195b7579f77SDag-Erling Smørgrav uint16_t port; 196b7579f77SDag-Erling Smørgrav const char* family = "unknown"; 197b7579f77SDag-Erling Smørgrav char dest[100]; 198b7579f77SDag-Erling Smørgrav int af = (int)((struct sockaddr_in*)addr)->sin_family; 199b7579f77SDag-Erling Smørgrav void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr; 200b7579f77SDag-Erling Smørgrav if(verbosity < v) 201b7579f77SDag-Erling Smørgrav return; 202b7579f77SDag-Erling Smørgrav switch(af) { 203b7579f77SDag-Erling Smørgrav case AF_INET: family="ip4"; break; 204b7579f77SDag-Erling Smørgrav case AF_INET6: family="ip6"; 205b7579f77SDag-Erling Smørgrav sinaddr = &((struct sockaddr_in6*)addr)->sin6_addr; 206b7579f77SDag-Erling Smørgrav break; 2076480faa8SDag-Erling Smørgrav case AF_LOCAL: 2086480faa8SDag-Erling Smørgrav dest[0]=0; 2096480faa8SDag-Erling Smørgrav (void)inet_ntop(af, sinaddr, dest, 2106480faa8SDag-Erling Smørgrav (socklen_t)sizeof(dest)); 2116480faa8SDag-Erling Smørgrav verbose(v, "%s local %s", str, dest); 2126480faa8SDag-Erling Smørgrav return; /* do not continue and try to get port */ 213b7579f77SDag-Erling Smørgrav default: break; 214b7579f77SDag-Erling Smørgrav } 215b7579f77SDag-Erling Smørgrav if(inet_ntop(af, sinaddr, dest, (socklen_t)sizeof(dest)) == 0) { 21617d15b25SDag-Erling Smørgrav (void)strlcpy(dest, "(inet_ntop error)", sizeof(dest)); 217b7579f77SDag-Erling Smørgrav } 218b7579f77SDag-Erling Smørgrav dest[sizeof(dest)-1] = 0; 219b7579f77SDag-Erling Smørgrav port = ntohs(((struct sockaddr_in*)addr)->sin_port); 220b7579f77SDag-Erling Smørgrav if(verbosity >= 4) 221b7579f77SDag-Erling Smørgrav verbose(v, "%s %s %s port %d (len %d)", str, family, dest, 222b7579f77SDag-Erling Smørgrav (int)port, (int)addrlen); 223b7579f77SDag-Erling Smørgrav else verbose(v, "%s %s port %d", str, dest, (int)port); 224b7579f77SDag-Erling Smørgrav } 225b7579f77SDag-Erling Smørgrav 226b7579f77SDag-Erling Smørgrav int 227b7579f77SDag-Erling Smørgrav extstrtoaddr(const char* str, struct sockaddr_storage* addr, 228b7579f77SDag-Erling Smørgrav socklen_t* addrlen) 229b7579f77SDag-Erling Smørgrav { 230b7579f77SDag-Erling Smørgrav char* s; 231b7579f77SDag-Erling Smørgrav int port = UNBOUND_DNS_PORT; 232b7579f77SDag-Erling Smørgrav if((s=strchr(str, '@'))) { 233b7579f77SDag-Erling Smørgrav char buf[MAX_ADDR_STRLEN]; 234b7579f77SDag-Erling Smørgrav if(s-str >= MAX_ADDR_STRLEN) { 235b7579f77SDag-Erling Smørgrav return 0; 236b7579f77SDag-Erling Smørgrav } 23717d15b25SDag-Erling Smørgrav (void)strlcpy(buf, str, sizeof(buf)); 238b7579f77SDag-Erling Smørgrav buf[s-str] = 0; 239b7579f77SDag-Erling Smørgrav port = atoi(s+1); 240b7579f77SDag-Erling Smørgrav if(port == 0 && strcmp(s+1,"0")!=0) { 241b7579f77SDag-Erling Smørgrav return 0; 242b7579f77SDag-Erling Smørgrav } 243b7579f77SDag-Erling Smørgrav return ipstrtoaddr(buf, port, addr, addrlen); 244b7579f77SDag-Erling Smørgrav } 245b7579f77SDag-Erling Smørgrav return ipstrtoaddr(str, port, addr, addrlen); 246b7579f77SDag-Erling Smørgrav } 247b7579f77SDag-Erling Smørgrav 248b7579f77SDag-Erling Smørgrav 249b7579f77SDag-Erling Smørgrav int 250b7579f77SDag-Erling Smørgrav ipstrtoaddr(const char* ip, int port, struct sockaddr_storage* addr, 251b7579f77SDag-Erling Smørgrav socklen_t* addrlen) 252b7579f77SDag-Erling Smørgrav { 253b7579f77SDag-Erling Smørgrav uint16_t p; 254b7579f77SDag-Erling Smørgrav if(!ip) return 0; 255b7579f77SDag-Erling Smørgrav p = (uint16_t) port; 256b7579f77SDag-Erling Smørgrav if(str_is_ip6(ip)) { 257b7579f77SDag-Erling Smørgrav char buf[MAX_ADDR_STRLEN]; 258b7579f77SDag-Erling Smørgrav char* s; 259b7579f77SDag-Erling Smørgrav struct sockaddr_in6* sa = (struct sockaddr_in6*)addr; 260b7579f77SDag-Erling Smørgrav *addrlen = (socklen_t)sizeof(struct sockaddr_in6); 261b7579f77SDag-Erling Smørgrav memset(sa, 0, *addrlen); 262b7579f77SDag-Erling Smørgrav sa->sin6_family = AF_INET6; 263b7579f77SDag-Erling Smørgrav sa->sin6_port = (in_port_t)htons(p); 264b7579f77SDag-Erling Smørgrav if((s=strchr(ip, '%'))) { /* ip6%interface, rfc 4007 */ 265b7579f77SDag-Erling Smørgrav if(s-ip >= MAX_ADDR_STRLEN) 266b7579f77SDag-Erling Smørgrav return 0; 26717d15b25SDag-Erling Smørgrav (void)strlcpy(buf, ip, sizeof(buf)); 268b7579f77SDag-Erling Smørgrav buf[s-ip]=0; 269b7579f77SDag-Erling Smørgrav sa->sin6_scope_id = (uint32_t)atoi(s+1); 270b7579f77SDag-Erling Smørgrav ip = buf; 271b7579f77SDag-Erling Smørgrav } 272b7579f77SDag-Erling Smørgrav if(inet_pton((int)sa->sin6_family, ip, &sa->sin6_addr) <= 0) { 273b7579f77SDag-Erling Smørgrav return 0; 274b7579f77SDag-Erling Smørgrav } 275b7579f77SDag-Erling Smørgrav } else { /* ip4 */ 276b7579f77SDag-Erling Smørgrav struct sockaddr_in* sa = (struct sockaddr_in*)addr; 277b7579f77SDag-Erling Smørgrav *addrlen = (socklen_t)sizeof(struct sockaddr_in); 278b7579f77SDag-Erling Smørgrav memset(sa, 0, *addrlen); 279b7579f77SDag-Erling Smørgrav sa->sin_family = AF_INET; 280b7579f77SDag-Erling Smørgrav sa->sin_port = (in_port_t)htons(p); 281b7579f77SDag-Erling Smørgrav if(inet_pton((int)sa->sin_family, ip, &sa->sin_addr) <= 0) { 282b7579f77SDag-Erling Smørgrav return 0; 283b7579f77SDag-Erling Smørgrav } 284b7579f77SDag-Erling Smørgrav } 285b7579f77SDag-Erling Smørgrav return 1; 286b7579f77SDag-Erling Smørgrav } 287b7579f77SDag-Erling Smørgrav 288b7579f77SDag-Erling Smørgrav int netblockstrtoaddr(const char* str, int port, struct sockaddr_storage* addr, 289b7579f77SDag-Erling Smørgrav socklen_t* addrlen, int* net) 290b7579f77SDag-Erling Smørgrav { 2910fb34990SDag-Erling Smørgrav char buf[64]; 2920fb34990SDag-Erling Smørgrav char* s; 293b7579f77SDag-Erling Smørgrav *net = (str_is_ip6(str)?128:32); 294b7579f77SDag-Erling Smørgrav if((s=strchr(str, '/'))) { 295b7579f77SDag-Erling Smørgrav if(atoi(s+1) > *net) { 296b7579f77SDag-Erling Smørgrav log_err("netblock too large: %s", str); 297b7579f77SDag-Erling Smørgrav return 0; 298b7579f77SDag-Erling Smørgrav } 299b7579f77SDag-Erling Smørgrav *net = atoi(s+1); 300b7579f77SDag-Erling Smørgrav if(*net == 0 && strcmp(s+1, "0") != 0) { 301b7579f77SDag-Erling Smørgrav log_err("cannot parse netblock: '%s'", str); 302b7579f77SDag-Erling Smørgrav return 0; 303b7579f77SDag-Erling Smørgrav } 3040fb34990SDag-Erling Smørgrav strlcpy(buf, str, sizeof(buf)); 3050fb34990SDag-Erling Smørgrav s = strchr(buf, '/'); 3060fb34990SDag-Erling Smørgrav if(s) *s = 0; 3070fb34990SDag-Erling Smørgrav s = buf; 308b7579f77SDag-Erling Smørgrav } 309b7579f77SDag-Erling Smørgrav if(!ipstrtoaddr(s?s:str, port, addr, addrlen)) { 310b7579f77SDag-Erling Smørgrav log_err("cannot parse ip address: '%s'", str); 311b7579f77SDag-Erling Smørgrav return 0; 312b7579f77SDag-Erling Smørgrav } 313b7579f77SDag-Erling Smørgrav if(s) { 314b7579f77SDag-Erling Smørgrav addr_mask(addr, *addrlen, *net); 315b7579f77SDag-Erling Smørgrav } 316b7579f77SDag-Erling Smørgrav return 1; 317b7579f77SDag-Erling Smørgrav } 318b7579f77SDag-Erling Smørgrav 319091e9e46SCy Schubert /* RPZ format address dname to network byte order address */ 320091e9e46SCy Schubert static int ipdnametoaddr(uint8_t* dname, size_t dnamelen, 321091e9e46SCy Schubert struct sockaddr_storage* addr, socklen_t* addrlen, int* af) 322091e9e46SCy Schubert { 323091e9e46SCy Schubert uint8_t* ia; 324091e9e46SCy Schubert size_t dnamelabs = dname_count_labels(dname); 325091e9e46SCy Schubert uint8_t lablen; 326091e9e46SCy Schubert char* e = NULL; 327091e9e46SCy Schubert int z = 0; 328091e9e46SCy Schubert size_t len = 0; 329091e9e46SCy Schubert int i; 330091e9e46SCy Schubert *af = AF_INET; 331091e9e46SCy Schubert 332091e9e46SCy Schubert /* need 1 byte for label length */ 333091e9e46SCy Schubert if(dnamelen < 1) 334091e9e46SCy Schubert return 0; 335091e9e46SCy Schubert 336091e9e46SCy Schubert if(dnamelabs > 6 || 337091e9e46SCy Schubert dname_has_label(dname, dnamelen, (uint8_t*)"\002zz")) { 338091e9e46SCy Schubert *af = AF_INET6; 339091e9e46SCy Schubert } 340091e9e46SCy Schubert len = *dname; 341091e9e46SCy Schubert lablen = *dname++; 342091e9e46SCy Schubert i = (*af == AF_INET) ? 3 : 15; 343091e9e46SCy Schubert if(*af == AF_INET6) { 344091e9e46SCy Schubert struct sockaddr_in6* sa = (struct sockaddr_in6*)addr; 345091e9e46SCy Schubert *addrlen = (socklen_t)sizeof(struct sockaddr_in6); 346091e9e46SCy Schubert memset(sa, 0, *addrlen); 347091e9e46SCy Schubert sa->sin6_family = AF_INET6; 348091e9e46SCy Schubert ia = (uint8_t*)&sa->sin6_addr; 349091e9e46SCy Schubert } else { /* ip4 */ 350091e9e46SCy Schubert struct sockaddr_in* sa = (struct sockaddr_in*)addr; 351091e9e46SCy Schubert *addrlen = (socklen_t)sizeof(struct sockaddr_in); 352091e9e46SCy Schubert memset(sa, 0, *addrlen); 353091e9e46SCy Schubert sa->sin_family = AF_INET; 354091e9e46SCy Schubert ia = (uint8_t*)&sa->sin_addr; 355091e9e46SCy Schubert } 356091e9e46SCy Schubert while(lablen && i >= 0 && len <= dnamelen) { 357091e9e46SCy Schubert char buff[LDNS_MAX_LABELLEN+1]; 358091e9e46SCy Schubert uint16_t chunk; /* big enough to not overflow on IPv6 hextet */ 359091e9e46SCy Schubert if((*af == AF_INET && (lablen > 3 || dnamelabs > 6)) || 360091e9e46SCy Schubert (*af == AF_INET6 && (lablen > 4 || dnamelabs > 10))) { 361091e9e46SCy Schubert return 0; 362091e9e46SCy Schubert } 363091e9e46SCy Schubert if(memcmp(dname, "zz", 2) == 0 && *af == AF_INET6) { 364091e9e46SCy Schubert /* Add one or more 0 labels. Address is initialised at 365091e9e46SCy Schubert * 0, so just skip the zero part. */ 366091e9e46SCy Schubert int zl = 11 - dnamelabs; 367091e9e46SCy Schubert if(z || zl < 0) 368091e9e46SCy Schubert return 0; 369091e9e46SCy Schubert z = 1; 370091e9e46SCy Schubert i -= (zl*2); 371091e9e46SCy Schubert } else { 372091e9e46SCy Schubert memcpy(buff, dname, lablen); 373091e9e46SCy Schubert buff[lablen] = '\0'; 374091e9e46SCy Schubert chunk = strtol(buff, &e, (*af == AF_INET) ? 10 : 16); 375091e9e46SCy Schubert if(!e || *e != '\0' || (*af == AF_INET && chunk > 255)) 376091e9e46SCy Schubert return 0; 377091e9e46SCy Schubert if(*af == AF_INET) { 378091e9e46SCy Schubert log_assert(i < 4 && i >= 0); 379091e9e46SCy Schubert ia[i] = (uint8_t)chunk; 380091e9e46SCy Schubert i--; 381091e9e46SCy Schubert } else { 382091e9e46SCy Schubert log_assert(i < 16 && i >= 1); 383091e9e46SCy Schubert /* ia in network byte order */ 384091e9e46SCy Schubert ia[i-1] = (uint8_t)(chunk >> 8); 385091e9e46SCy Schubert ia[i] = (uint8_t)(chunk & 0x00FF); 386091e9e46SCy Schubert i -= 2; 387091e9e46SCy Schubert } 388091e9e46SCy Schubert } 389091e9e46SCy Schubert dname += lablen; 390091e9e46SCy Schubert lablen = *dname++; 391091e9e46SCy Schubert len += lablen; 392091e9e46SCy Schubert } 393091e9e46SCy Schubert if(i != -1) 394091e9e46SCy Schubert /* input too short */ 395091e9e46SCy Schubert return 0; 396091e9e46SCy Schubert return 1; 397091e9e46SCy Schubert } 398091e9e46SCy Schubert 399091e9e46SCy Schubert int netblockdnametoaddr(uint8_t* dname, size_t dnamelen, 400091e9e46SCy Schubert struct sockaddr_storage* addr, socklen_t* addrlen, int* net, int* af) 401091e9e46SCy Schubert { 402091e9e46SCy Schubert char buff[3 /* 3 digit netblock */ + 1]; 403091e9e46SCy Schubert size_t nlablen; 404091e9e46SCy Schubert if(dnamelen < 1 || *dname > 3) 405091e9e46SCy Schubert /* netblock invalid */ 406091e9e46SCy Schubert return 0; 407091e9e46SCy Schubert nlablen = *dname; 408091e9e46SCy Schubert 409091e9e46SCy Schubert if(dnamelen < 1 + nlablen) 410091e9e46SCy Schubert return 0; 411091e9e46SCy Schubert 412091e9e46SCy Schubert memcpy(buff, dname+1, nlablen); 413091e9e46SCy Schubert buff[nlablen] = '\0'; 414091e9e46SCy Schubert *net = atoi(buff); 415091e9e46SCy Schubert if(*net == 0 && strcmp(buff, "0") != 0) 416091e9e46SCy Schubert return 0; 417091e9e46SCy Schubert dname += nlablen; 418091e9e46SCy Schubert dname++; 419091e9e46SCy Schubert if(!ipdnametoaddr(dname, dnamelen-1-nlablen, addr, addrlen, af)) 420091e9e46SCy Schubert return 0; 421091e9e46SCy Schubert if((*af == AF_INET6 && *net > 128) || (*af == AF_INET && *net > 32)) 422091e9e46SCy Schubert return 0; 423091e9e46SCy Schubert return 1; 424091e9e46SCy Schubert } 425091e9e46SCy Schubert 4260fb34990SDag-Erling Smørgrav int authextstrtoaddr(char* str, struct sockaddr_storage* addr, 4270fb34990SDag-Erling Smørgrav socklen_t* addrlen, char** auth_name) 4280fb34990SDag-Erling Smørgrav { 4290fb34990SDag-Erling Smørgrav char* s; 4300fb34990SDag-Erling Smørgrav int port = UNBOUND_DNS_PORT; 4310fb34990SDag-Erling Smørgrav if((s=strchr(str, '@'))) { 4320fb34990SDag-Erling Smørgrav char buf[MAX_ADDR_STRLEN]; 4330fb34990SDag-Erling Smørgrav size_t len = (size_t)(s-str); 4340fb34990SDag-Erling Smørgrav char* hash = strchr(s+1, '#'); 4350fb34990SDag-Erling Smørgrav if(hash) { 4360fb34990SDag-Erling Smørgrav *auth_name = hash+1; 4370fb34990SDag-Erling Smørgrav } else { 4380fb34990SDag-Erling Smørgrav *auth_name = NULL; 4390fb34990SDag-Erling Smørgrav } 4400fb34990SDag-Erling Smørgrav if(len >= MAX_ADDR_STRLEN) { 4410fb34990SDag-Erling Smørgrav return 0; 4420fb34990SDag-Erling Smørgrav } 4430fb34990SDag-Erling Smørgrav (void)strlcpy(buf, str, sizeof(buf)); 4440fb34990SDag-Erling Smørgrav buf[len] = 0; 4450fb34990SDag-Erling Smørgrav port = atoi(s+1); 4460fb34990SDag-Erling Smørgrav if(port == 0) { 4470fb34990SDag-Erling Smørgrav if(!hash && strcmp(s+1,"0")!=0) 4480fb34990SDag-Erling Smørgrav return 0; 4490fb34990SDag-Erling Smørgrav if(hash && strncmp(s+1,"0#",2)!=0) 4500fb34990SDag-Erling Smørgrav return 0; 4510fb34990SDag-Erling Smørgrav } 4520fb34990SDag-Erling Smørgrav return ipstrtoaddr(buf, port, addr, addrlen); 4530fb34990SDag-Erling Smørgrav } 4540fb34990SDag-Erling Smørgrav if((s=strchr(str, '#'))) { 4550fb34990SDag-Erling Smørgrav char buf[MAX_ADDR_STRLEN]; 4560fb34990SDag-Erling Smørgrav size_t len = (size_t)(s-str); 4570fb34990SDag-Erling Smørgrav if(len >= MAX_ADDR_STRLEN) { 4580fb34990SDag-Erling Smørgrav return 0; 4590fb34990SDag-Erling Smørgrav } 4600fb34990SDag-Erling Smørgrav (void)strlcpy(buf, str, sizeof(buf)); 4610fb34990SDag-Erling Smørgrav buf[len] = 0; 4620fb34990SDag-Erling Smørgrav port = UNBOUND_DNS_OVER_TLS_PORT; 4630fb34990SDag-Erling Smørgrav *auth_name = s+1; 4640fb34990SDag-Erling Smørgrav return ipstrtoaddr(buf, port, addr, addrlen); 4650fb34990SDag-Erling Smørgrav } 4660fb34990SDag-Erling Smørgrav *auth_name = NULL; 4670fb34990SDag-Erling Smørgrav return ipstrtoaddr(str, port, addr, addrlen); 4680fb34990SDag-Erling Smørgrav } 4690fb34990SDag-Erling Smørgrav 47057bddd21SDag-Erling Smørgrav /** store port number into sockaddr structure */ 47157bddd21SDag-Erling Smørgrav void 47257bddd21SDag-Erling Smørgrav sockaddr_store_port(struct sockaddr_storage* addr, socklen_t addrlen, int port) 47357bddd21SDag-Erling Smørgrav { 47457bddd21SDag-Erling Smørgrav if(addr_is_ip6(addr, addrlen)) { 47557bddd21SDag-Erling Smørgrav struct sockaddr_in6* sa = (struct sockaddr_in6*)addr; 47657bddd21SDag-Erling Smørgrav sa->sin6_port = (in_port_t)htons((uint16_t)port); 47757bddd21SDag-Erling Smørgrav } else { 47857bddd21SDag-Erling Smørgrav struct sockaddr_in* sa = (struct sockaddr_in*)addr; 47957bddd21SDag-Erling Smørgrav sa->sin_port = (in_port_t)htons((uint16_t)port); 48057bddd21SDag-Erling Smørgrav } 48157bddd21SDag-Erling Smørgrav } 48257bddd21SDag-Erling Smørgrav 483b7579f77SDag-Erling Smørgrav void 484b7579f77SDag-Erling Smørgrav log_nametypeclass(enum verbosity_value v, const char* str, uint8_t* name, 485b7579f77SDag-Erling Smørgrav uint16_t type, uint16_t dclass) 486b7579f77SDag-Erling Smørgrav { 487b7579f77SDag-Erling Smørgrav char buf[LDNS_MAX_DOMAINLEN+1]; 488b7579f77SDag-Erling Smørgrav char t[12], c[12]; 489b7579f77SDag-Erling Smørgrav const char *ts, *cs; 490b7579f77SDag-Erling Smørgrav if(verbosity < v) 491b7579f77SDag-Erling Smørgrav return; 492b7579f77SDag-Erling Smørgrav dname_str(name, buf); 493b7579f77SDag-Erling Smørgrav if(type == LDNS_RR_TYPE_TSIG) ts = "TSIG"; 494b7579f77SDag-Erling Smørgrav else if(type == LDNS_RR_TYPE_IXFR) ts = "IXFR"; 495b7579f77SDag-Erling Smørgrav else if(type == LDNS_RR_TYPE_AXFR) ts = "AXFR"; 496b7579f77SDag-Erling Smørgrav else if(type == LDNS_RR_TYPE_MAILB) ts = "MAILB"; 497b7579f77SDag-Erling Smørgrav else if(type == LDNS_RR_TYPE_MAILA) ts = "MAILA"; 498b7579f77SDag-Erling Smørgrav else if(type == LDNS_RR_TYPE_ANY) ts = "ANY"; 49917d15b25SDag-Erling Smørgrav else if(sldns_rr_descript(type) && sldns_rr_descript(type)->_name) 50017d15b25SDag-Erling Smørgrav ts = sldns_rr_descript(type)->_name; 501b7579f77SDag-Erling Smørgrav else { 502b7579f77SDag-Erling Smørgrav snprintf(t, sizeof(t), "TYPE%d", (int)type); 503b7579f77SDag-Erling Smørgrav ts = t; 504b7579f77SDag-Erling Smørgrav } 50517d15b25SDag-Erling Smørgrav if(sldns_lookup_by_id(sldns_rr_classes, (int)dclass) && 50617d15b25SDag-Erling Smørgrav sldns_lookup_by_id(sldns_rr_classes, (int)dclass)->name) 50717d15b25SDag-Erling Smørgrav cs = sldns_lookup_by_id(sldns_rr_classes, (int)dclass)->name; 508b7579f77SDag-Erling Smørgrav else { 509b7579f77SDag-Erling Smørgrav snprintf(c, sizeof(c), "CLASS%d", (int)dclass); 510b7579f77SDag-Erling Smørgrav cs = c; 511b7579f77SDag-Erling Smørgrav } 512b7579f77SDag-Erling Smørgrav log_info("%s %s %s %s", str, buf, ts, cs); 513b7579f77SDag-Erling Smørgrav } 514b7579f77SDag-Erling Smørgrav 515e86b9096SDag-Erling Smørgrav void 516e86b9096SDag-Erling Smørgrav log_query_in(const char* str, uint8_t* name, uint16_t type, uint16_t dclass) 517e86b9096SDag-Erling Smørgrav { 518e86b9096SDag-Erling Smørgrav char buf[LDNS_MAX_DOMAINLEN+1]; 519e86b9096SDag-Erling Smørgrav char t[12], c[12]; 520e86b9096SDag-Erling Smørgrav const char *ts, *cs; 521e86b9096SDag-Erling Smørgrav dname_str(name, buf); 522e86b9096SDag-Erling Smørgrav if(type == LDNS_RR_TYPE_TSIG) ts = "TSIG"; 523e86b9096SDag-Erling Smørgrav else if(type == LDNS_RR_TYPE_IXFR) ts = "IXFR"; 524e86b9096SDag-Erling Smørgrav else if(type == LDNS_RR_TYPE_AXFR) ts = "AXFR"; 525e86b9096SDag-Erling Smørgrav else if(type == LDNS_RR_TYPE_MAILB) ts = "MAILB"; 526e86b9096SDag-Erling Smørgrav else if(type == LDNS_RR_TYPE_MAILA) ts = "MAILA"; 527e86b9096SDag-Erling Smørgrav else if(type == LDNS_RR_TYPE_ANY) ts = "ANY"; 528e86b9096SDag-Erling Smørgrav else if(sldns_rr_descript(type) && sldns_rr_descript(type)->_name) 529e86b9096SDag-Erling Smørgrav ts = sldns_rr_descript(type)->_name; 530e86b9096SDag-Erling Smørgrav else { 531e86b9096SDag-Erling Smørgrav snprintf(t, sizeof(t), "TYPE%d", (int)type); 532e86b9096SDag-Erling Smørgrav ts = t; 533e86b9096SDag-Erling Smørgrav } 534e86b9096SDag-Erling Smørgrav if(sldns_lookup_by_id(sldns_rr_classes, (int)dclass) && 535e86b9096SDag-Erling Smørgrav sldns_lookup_by_id(sldns_rr_classes, (int)dclass)->name) 536e86b9096SDag-Erling Smørgrav cs = sldns_lookup_by_id(sldns_rr_classes, (int)dclass)->name; 537e86b9096SDag-Erling Smørgrav else { 538e86b9096SDag-Erling Smørgrav snprintf(c, sizeof(c), "CLASS%d", (int)dclass); 539e86b9096SDag-Erling Smørgrav cs = c; 540e86b9096SDag-Erling Smørgrav } 541e86b9096SDag-Erling Smørgrav if(LOG_TAG_QUERYREPLY) 542e86b9096SDag-Erling Smørgrav log_query("%s %s %s %s", str, buf, ts, cs); 543e86b9096SDag-Erling Smørgrav else log_info("%s %s %s %s", str, buf, ts, cs); 544e86b9096SDag-Erling Smørgrav } 545e86b9096SDag-Erling Smørgrav 546b7579f77SDag-Erling Smørgrav void log_name_addr(enum verbosity_value v, const char* str, uint8_t* zone, 547b7579f77SDag-Erling Smørgrav struct sockaddr_storage* addr, socklen_t addrlen) 548b7579f77SDag-Erling Smørgrav { 549b7579f77SDag-Erling Smørgrav uint16_t port; 550b7579f77SDag-Erling Smørgrav const char* family = "unknown_family "; 551b7579f77SDag-Erling Smørgrav char namebuf[LDNS_MAX_DOMAINLEN+1]; 552b7579f77SDag-Erling Smørgrav char dest[100]; 553b7579f77SDag-Erling Smørgrav int af = (int)((struct sockaddr_in*)addr)->sin_family; 554b7579f77SDag-Erling Smørgrav void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr; 555b7579f77SDag-Erling Smørgrav if(verbosity < v) 556b7579f77SDag-Erling Smørgrav return; 557b7579f77SDag-Erling Smørgrav switch(af) { 558b7579f77SDag-Erling Smørgrav case AF_INET: family=""; break; 559b7579f77SDag-Erling Smørgrav case AF_INET6: family=""; 560b7579f77SDag-Erling Smørgrav sinaddr = &((struct sockaddr_in6*)addr)->sin6_addr; 561b7579f77SDag-Erling Smørgrav break; 56231099b50SDag-Erling Smørgrav case AF_LOCAL: family="local "; break; 563b7579f77SDag-Erling Smørgrav default: break; 564b7579f77SDag-Erling Smørgrav } 565b7579f77SDag-Erling Smørgrav if(inet_ntop(af, sinaddr, dest, (socklen_t)sizeof(dest)) == 0) { 56617d15b25SDag-Erling Smørgrav (void)strlcpy(dest, "(inet_ntop error)", sizeof(dest)); 567b7579f77SDag-Erling Smørgrav } 568b7579f77SDag-Erling Smørgrav dest[sizeof(dest)-1] = 0; 569b7579f77SDag-Erling Smørgrav port = ntohs(((struct sockaddr_in*)addr)->sin_port); 570b7579f77SDag-Erling Smørgrav dname_str(zone, namebuf); 571b7579f77SDag-Erling Smørgrav if(af != AF_INET && af != AF_INET6) 572b7579f77SDag-Erling Smørgrav verbose(v, "%s <%s> %s%s#%d (addrlen %d)", 573b7579f77SDag-Erling Smørgrav str, namebuf, family, dest, (int)port, (int)addrlen); 574b7579f77SDag-Erling Smørgrav else verbose(v, "%s <%s> %s%s#%d", 575b7579f77SDag-Erling Smørgrav str, namebuf, family, dest, (int)port); 576b7579f77SDag-Erling Smørgrav } 577b7579f77SDag-Erling Smørgrav 578ff825849SDag-Erling Smørgrav void log_err_addr(const char* str, const char* err, 579ff825849SDag-Erling Smørgrav struct sockaddr_storage* addr, socklen_t addrlen) 580ff825849SDag-Erling Smørgrav { 581ff825849SDag-Erling Smørgrav uint16_t port; 582ff825849SDag-Erling Smørgrav char dest[100]; 583ff825849SDag-Erling Smørgrav int af = (int)((struct sockaddr_in*)addr)->sin_family; 584ff825849SDag-Erling Smørgrav void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr; 585ff825849SDag-Erling Smørgrav if(af == AF_INET6) 586ff825849SDag-Erling Smørgrav sinaddr = &((struct sockaddr_in6*)addr)->sin6_addr; 587ff825849SDag-Erling Smørgrav if(inet_ntop(af, sinaddr, dest, (socklen_t)sizeof(dest)) == 0) { 588ff825849SDag-Erling Smørgrav (void)strlcpy(dest, "(inet_ntop error)", sizeof(dest)); 589ff825849SDag-Erling Smørgrav } 590ff825849SDag-Erling Smørgrav dest[sizeof(dest)-1] = 0; 591ff825849SDag-Erling Smørgrav port = ntohs(((struct sockaddr_in*)addr)->sin_port); 592ff825849SDag-Erling Smørgrav if(verbosity >= 4) 593ff825849SDag-Erling Smørgrav log_err("%s: %s for %s port %d (len %d)", str, err, dest, 594ff825849SDag-Erling Smørgrav (int)port, (int)addrlen); 5954c75e3aaSDag-Erling Smørgrav else log_err("%s: %s for %s port %d", str, err, dest, (int)port); 596ff825849SDag-Erling Smørgrav } 597ff825849SDag-Erling Smørgrav 598b7579f77SDag-Erling Smørgrav int 599b7579f77SDag-Erling Smørgrav sockaddr_cmp(struct sockaddr_storage* addr1, socklen_t len1, 600b7579f77SDag-Erling Smørgrav struct sockaddr_storage* addr2, socklen_t len2) 601b7579f77SDag-Erling Smørgrav { 602b7579f77SDag-Erling Smørgrav struct sockaddr_in* p1_in = (struct sockaddr_in*)addr1; 603b7579f77SDag-Erling Smørgrav struct sockaddr_in* p2_in = (struct sockaddr_in*)addr2; 604b7579f77SDag-Erling Smørgrav struct sockaddr_in6* p1_in6 = (struct sockaddr_in6*)addr1; 605b7579f77SDag-Erling Smørgrav struct sockaddr_in6* p2_in6 = (struct sockaddr_in6*)addr2; 606b7579f77SDag-Erling Smørgrav if(len1 < len2) 607b7579f77SDag-Erling Smørgrav return -1; 608b7579f77SDag-Erling Smørgrav if(len1 > len2) 609b7579f77SDag-Erling Smørgrav return 1; 610b7579f77SDag-Erling Smørgrav log_assert(len1 == len2); 611b7579f77SDag-Erling Smørgrav if( p1_in->sin_family < p2_in->sin_family) 612b7579f77SDag-Erling Smørgrav return -1; 613b7579f77SDag-Erling Smørgrav if( p1_in->sin_family > p2_in->sin_family) 614b7579f77SDag-Erling Smørgrav return 1; 615b7579f77SDag-Erling Smørgrav log_assert( p1_in->sin_family == p2_in->sin_family ); 616b7579f77SDag-Erling Smørgrav /* compare ip4 */ 617b7579f77SDag-Erling Smørgrav if( p1_in->sin_family == AF_INET ) { 618b7579f77SDag-Erling Smørgrav /* just order it, ntohs not required */ 619b7579f77SDag-Erling Smørgrav if(p1_in->sin_port < p2_in->sin_port) 620b7579f77SDag-Erling Smørgrav return -1; 621b7579f77SDag-Erling Smørgrav if(p1_in->sin_port > p2_in->sin_port) 622b7579f77SDag-Erling Smørgrav return 1; 623b7579f77SDag-Erling Smørgrav log_assert(p1_in->sin_port == p2_in->sin_port); 624b7579f77SDag-Erling Smørgrav return memcmp(&p1_in->sin_addr, &p2_in->sin_addr, INET_SIZE); 625b7579f77SDag-Erling Smørgrav } else if (p1_in6->sin6_family == AF_INET6) { 626b7579f77SDag-Erling Smørgrav /* just order it, ntohs not required */ 627b7579f77SDag-Erling Smørgrav if(p1_in6->sin6_port < p2_in6->sin6_port) 628b7579f77SDag-Erling Smørgrav return -1; 629b7579f77SDag-Erling Smørgrav if(p1_in6->sin6_port > p2_in6->sin6_port) 630b7579f77SDag-Erling Smørgrav return 1; 631b7579f77SDag-Erling Smørgrav log_assert(p1_in6->sin6_port == p2_in6->sin6_port); 632b7579f77SDag-Erling Smørgrav return memcmp(&p1_in6->sin6_addr, &p2_in6->sin6_addr, 633b7579f77SDag-Erling Smørgrav INET6_SIZE); 634b7579f77SDag-Erling Smørgrav } else { 635b7579f77SDag-Erling Smørgrav /* eek unknown type, perform this comparison for sanity. */ 636b7579f77SDag-Erling Smørgrav return memcmp(addr1, addr2, len1); 637b7579f77SDag-Erling Smørgrav } 638b7579f77SDag-Erling Smørgrav } 639b7579f77SDag-Erling Smørgrav 640b7579f77SDag-Erling Smørgrav int 641b7579f77SDag-Erling Smørgrav sockaddr_cmp_addr(struct sockaddr_storage* addr1, socklen_t len1, 642b7579f77SDag-Erling Smørgrav struct sockaddr_storage* addr2, socklen_t len2) 643b7579f77SDag-Erling Smørgrav { 644b7579f77SDag-Erling Smørgrav struct sockaddr_in* p1_in = (struct sockaddr_in*)addr1; 645b7579f77SDag-Erling Smørgrav struct sockaddr_in* p2_in = (struct sockaddr_in*)addr2; 646b7579f77SDag-Erling Smørgrav struct sockaddr_in6* p1_in6 = (struct sockaddr_in6*)addr1; 647b7579f77SDag-Erling Smørgrav struct sockaddr_in6* p2_in6 = (struct sockaddr_in6*)addr2; 648b7579f77SDag-Erling Smørgrav if(len1 < len2) 649b7579f77SDag-Erling Smørgrav return -1; 650b7579f77SDag-Erling Smørgrav if(len1 > len2) 651b7579f77SDag-Erling Smørgrav return 1; 652b7579f77SDag-Erling Smørgrav log_assert(len1 == len2); 653b7579f77SDag-Erling Smørgrav if( p1_in->sin_family < p2_in->sin_family) 654b7579f77SDag-Erling Smørgrav return -1; 655b7579f77SDag-Erling Smørgrav if( p1_in->sin_family > p2_in->sin_family) 656b7579f77SDag-Erling Smørgrav return 1; 657b7579f77SDag-Erling Smørgrav log_assert( p1_in->sin_family == p2_in->sin_family ); 658b7579f77SDag-Erling Smørgrav /* compare ip4 */ 659b7579f77SDag-Erling Smørgrav if( p1_in->sin_family == AF_INET ) { 660b7579f77SDag-Erling Smørgrav return memcmp(&p1_in->sin_addr, &p2_in->sin_addr, INET_SIZE); 661b7579f77SDag-Erling Smørgrav } else if (p1_in6->sin6_family == AF_INET6) { 662b7579f77SDag-Erling Smørgrav return memcmp(&p1_in6->sin6_addr, &p2_in6->sin6_addr, 663b7579f77SDag-Erling Smørgrav INET6_SIZE); 664b7579f77SDag-Erling Smørgrav } else { 665b7579f77SDag-Erling Smørgrav /* eek unknown type, perform this comparison for sanity. */ 666b7579f77SDag-Erling Smørgrav return memcmp(addr1, addr2, len1); 667b7579f77SDag-Erling Smørgrav } 668b7579f77SDag-Erling Smørgrav } 669b7579f77SDag-Erling Smørgrav 670b7579f77SDag-Erling Smørgrav int 671b7579f77SDag-Erling Smørgrav addr_is_ip6(struct sockaddr_storage* addr, socklen_t len) 672b7579f77SDag-Erling Smørgrav { 673b7579f77SDag-Erling Smørgrav if(len == (socklen_t)sizeof(struct sockaddr_in6) && 674b7579f77SDag-Erling Smørgrav ((struct sockaddr_in6*)addr)->sin6_family == AF_INET6) 675b7579f77SDag-Erling Smørgrav return 1; 676b7579f77SDag-Erling Smørgrav else return 0; 677b7579f77SDag-Erling Smørgrav } 678b7579f77SDag-Erling Smørgrav 679b7579f77SDag-Erling Smørgrav void 680b7579f77SDag-Erling Smørgrav addr_mask(struct sockaddr_storage* addr, socklen_t len, int net) 681b7579f77SDag-Erling Smørgrav { 682b7579f77SDag-Erling Smørgrav uint8_t mask[8] = {0x0, 0x80, 0xc0, 0xe0, 0xf0, 0xf8, 0xfc, 0xfe}; 683b7579f77SDag-Erling Smørgrav int i, max; 684b7579f77SDag-Erling Smørgrav uint8_t* s; 685b7579f77SDag-Erling Smørgrav if(addr_is_ip6(addr, len)) { 686b7579f77SDag-Erling Smørgrav s = (uint8_t*)&((struct sockaddr_in6*)addr)->sin6_addr; 687b7579f77SDag-Erling Smørgrav max = 128; 688b7579f77SDag-Erling Smørgrav } else { 689b7579f77SDag-Erling Smørgrav s = (uint8_t*)&((struct sockaddr_in*)addr)->sin_addr; 690b7579f77SDag-Erling Smørgrav max = 32; 691b7579f77SDag-Erling Smørgrav } 692b7579f77SDag-Erling Smørgrav if(net >= max) 693b7579f77SDag-Erling Smørgrav return; 694b7579f77SDag-Erling Smørgrav for(i=net/8+1; i<max/8; i++) { 695b7579f77SDag-Erling Smørgrav s[i] = 0; 696b7579f77SDag-Erling Smørgrav } 697b7579f77SDag-Erling Smørgrav s[net/8] &= mask[net&0x7]; 698b7579f77SDag-Erling Smørgrav } 699b7579f77SDag-Erling Smørgrav 700b7579f77SDag-Erling Smørgrav int 701b7579f77SDag-Erling Smørgrav addr_in_common(struct sockaddr_storage* addr1, int net1, 702b7579f77SDag-Erling Smørgrav struct sockaddr_storage* addr2, int net2, socklen_t addrlen) 703b7579f77SDag-Erling Smørgrav { 704b7579f77SDag-Erling Smørgrav int min = (net1<net2)?net1:net2; 705b7579f77SDag-Erling Smørgrav int i, to; 706b7579f77SDag-Erling Smørgrav int match = 0; 707b7579f77SDag-Erling Smørgrav uint8_t* s1, *s2; 708b7579f77SDag-Erling Smørgrav if(addr_is_ip6(addr1, addrlen)) { 709b7579f77SDag-Erling Smørgrav s1 = (uint8_t*)&((struct sockaddr_in6*)addr1)->sin6_addr; 710b7579f77SDag-Erling Smørgrav s2 = (uint8_t*)&((struct sockaddr_in6*)addr2)->sin6_addr; 711b7579f77SDag-Erling Smørgrav to = 16; 712b7579f77SDag-Erling Smørgrav } else { 713b7579f77SDag-Erling Smørgrav s1 = (uint8_t*)&((struct sockaddr_in*)addr1)->sin_addr; 714b7579f77SDag-Erling Smørgrav s2 = (uint8_t*)&((struct sockaddr_in*)addr2)->sin_addr; 715b7579f77SDag-Erling Smørgrav to = 4; 716b7579f77SDag-Erling Smørgrav } 717b7579f77SDag-Erling Smørgrav /* match = bits_in_common(s1, s2, to); */ 718b7579f77SDag-Erling Smørgrav for(i=0; i<to; i++) { 719b7579f77SDag-Erling Smørgrav if(s1[i] == s2[i]) { 720b7579f77SDag-Erling Smørgrav match += 8; 721b7579f77SDag-Erling Smørgrav } else { 722b7579f77SDag-Erling Smørgrav uint8_t z = s1[i]^s2[i]; 723b7579f77SDag-Erling Smørgrav log_assert(z); 724b7579f77SDag-Erling Smørgrav while(!(z&0x80)) { 725b7579f77SDag-Erling Smørgrav match++; 726b7579f77SDag-Erling Smørgrav z<<=1; 727b7579f77SDag-Erling Smørgrav } 728b7579f77SDag-Erling Smørgrav break; 729b7579f77SDag-Erling Smørgrav } 730b7579f77SDag-Erling Smørgrav } 731b7579f77SDag-Erling Smørgrav if(match > min) match = min; 732b7579f77SDag-Erling Smørgrav return match; 733b7579f77SDag-Erling Smørgrav } 734b7579f77SDag-Erling Smørgrav 735b7579f77SDag-Erling Smørgrav void 736b7579f77SDag-Erling Smørgrav addr_to_str(struct sockaddr_storage* addr, socklen_t addrlen, 737b7579f77SDag-Erling Smørgrav char* buf, size_t len) 738b7579f77SDag-Erling Smørgrav { 739b7579f77SDag-Erling Smørgrav int af = (int)((struct sockaddr_in*)addr)->sin_family; 740b7579f77SDag-Erling Smørgrav void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr; 741b7579f77SDag-Erling Smørgrav if(addr_is_ip6(addr, addrlen)) 742b7579f77SDag-Erling Smørgrav sinaddr = &((struct sockaddr_in6*)addr)->sin6_addr; 743b7579f77SDag-Erling Smørgrav if(inet_ntop(af, sinaddr, buf, (socklen_t)len) == 0) { 744b7579f77SDag-Erling Smørgrav snprintf(buf, len, "(inet_ntop_error)"); 745b7579f77SDag-Erling Smørgrav } 746b7579f77SDag-Erling Smørgrav } 747b7579f77SDag-Erling Smørgrav 748b7579f77SDag-Erling Smørgrav int 749b7579f77SDag-Erling Smørgrav addr_is_ip4mapped(struct sockaddr_storage* addr, socklen_t addrlen) 750b7579f77SDag-Erling Smørgrav { 751b7579f77SDag-Erling Smørgrav /* prefix for ipv4 into ipv6 mapping is ::ffff:x.x.x.x */ 752b7579f77SDag-Erling Smørgrav const uint8_t map_prefix[16] = 753b7579f77SDag-Erling Smørgrav {0,0,0,0, 0,0,0,0, 0,0,0xff,0xff, 0,0,0,0}; 754b7579f77SDag-Erling Smørgrav uint8_t* s; 755b7579f77SDag-Erling Smørgrav if(!addr_is_ip6(addr, addrlen)) 756b7579f77SDag-Erling Smørgrav return 0; 757b7579f77SDag-Erling Smørgrav /* s is 16 octet ipv6 address string */ 758b7579f77SDag-Erling Smørgrav s = (uint8_t*)&((struct sockaddr_in6*)addr)->sin6_addr; 759b7579f77SDag-Erling Smørgrav return (memcmp(s, map_prefix, 12) == 0); 760b7579f77SDag-Erling Smørgrav } 761b7579f77SDag-Erling Smørgrav 762b7579f77SDag-Erling Smørgrav int addr_is_broadcast(struct sockaddr_storage* addr, socklen_t addrlen) 763b7579f77SDag-Erling Smørgrav { 764b7579f77SDag-Erling Smørgrav int af = (int)((struct sockaddr_in*)addr)->sin_family; 765b7579f77SDag-Erling Smørgrav void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr; 766b7579f77SDag-Erling Smørgrav return af == AF_INET && addrlen>=(socklen_t)sizeof(struct sockaddr_in) 767b7579f77SDag-Erling Smørgrav && memcmp(sinaddr, "\377\377\377\377", 4) == 0; 768b7579f77SDag-Erling Smørgrav } 769b7579f77SDag-Erling Smørgrav 770b7579f77SDag-Erling Smørgrav int addr_is_any(struct sockaddr_storage* addr, socklen_t addrlen) 771b7579f77SDag-Erling Smørgrav { 772b7579f77SDag-Erling Smørgrav int af = (int)((struct sockaddr_in*)addr)->sin_family; 773b7579f77SDag-Erling Smørgrav void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr; 774b7579f77SDag-Erling Smørgrav void* sin6addr = &((struct sockaddr_in6*)addr)->sin6_addr; 775b7579f77SDag-Erling Smørgrav if(af == AF_INET && addrlen>=(socklen_t)sizeof(struct sockaddr_in) 776b7579f77SDag-Erling Smørgrav && memcmp(sinaddr, "\000\000\000\000", 4) == 0) 777b7579f77SDag-Erling Smørgrav return 1; 778b7579f77SDag-Erling Smørgrav else if(af==AF_INET6 && addrlen>=(socklen_t)sizeof(struct sockaddr_in6) 779b7579f77SDag-Erling Smørgrav && memcmp(sin6addr, "\000\000\000\000\000\000\000\000" 780b7579f77SDag-Erling Smørgrav "\000\000\000\000\000\000\000\000", 16) == 0) 781b7579f77SDag-Erling Smørgrav return 1; 782b7579f77SDag-Erling Smørgrav return 0; 783b7579f77SDag-Erling Smørgrav } 784b7579f77SDag-Erling Smørgrav 785b7579f77SDag-Erling Smørgrav void sock_list_insert(struct sock_list** list, struct sockaddr_storage* addr, 786b7579f77SDag-Erling Smørgrav socklen_t len, struct regional* region) 787b7579f77SDag-Erling Smørgrav { 788b7579f77SDag-Erling Smørgrav struct sock_list* add = (struct sock_list*)regional_alloc(region, 789b7579f77SDag-Erling Smørgrav sizeof(*add) - sizeof(add->addr) + (size_t)len); 790b7579f77SDag-Erling Smørgrav if(!add) { 791b7579f77SDag-Erling Smørgrav log_err("out of memory in socketlist insert"); 792b7579f77SDag-Erling Smørgrav return; 793b7579f77SDag-Erling Smørgrav } 794b7579f77SDag-Erling Smørgrav log_assert(list); 795b7579f77SDag-Erling Smørgrav add->next = *list; 796b7579f77SDag-Erling Smørgrav add->len = len; 797b7579f77SDag-Erling Smørgrav *list = add; 798b7579f77SDag-Erling Smørgrav if(len) memmove(&add->addr, addr, len); 799b7579f77SDag-Erling Smørgrav } 800b7579f77SDag-Erling Smørgrav 801b7579f77SDag-Erling Smørgrav void sock_list_prepend(struct sock_list** list, struct sock_list* add) 802b7579f77SDag-Erling Smørgrav { 803b7579f77SDag-Erling Smørgrav struct sock_list* last = add; 804b7579f77SDag-Erling Smørgrav if(!last) 805b7579f77SDag-Erling Smørgrav return; 806b7579f77SDag-Erling Smørgrav while(last->next) 807b7579f77SDag-Erling Smørgrav last = last->next; 808b7579f77SDag-Erling Smørgrav last->next = *list; 809b7579f77SDag-Erling Smørgrav *list = add; 810b7579f77SDag-Erling Smørgrav } 811b7579f77SDag-Erling Smørgrav 812b7579f77SDag-Erling Smørgrav int sock_list_find(struct sock_list* list, struct sockaddr_storage* addr, 813b7579f77SDag-Erling Smørgrav socklen_t len) 814b7579f77SDag-Erling Smørgrav { 815b7579f77SDag-Erling Smørgrav while(list) { 816b7579f77SDag-Erling Smørgrav if(len == list->len) { 817b7579f77SDag-Erling Smørgrav if(len == 0 || sockaddr_cmp_addr(addr, len, 818b7579f77SDag-Erling Smørgrav &list->addr, list->len) == 0) 819b7579f77SDag-Erling Smørgrav return 1; 820b7579f77SDag-Erling Smørgrav } 821b7579f77SDag-Erling Smørgrav list = list->next; 822b7579f77SDag-Erling Smørgrav } 823b7579f77SDag-Erling Smørgrav return 0; 824b7579f77SDag-Erling Smørgrav } 825b7579f77SDag-Erling Smørgrav 826b7579f77SDag-Erling Smørgrav void sock_list_merge(struct sock_list** list, struct regional* region, 827b7579f77SDag-Erling Smørgrav struct sock_list* add) 828b7579f77SDag-Erling Smørgrav { 829b7579f77SDag-Erling Smørgrav struct sock_list* p; 830b7579f77SDag-Erling Smørgrav for(p=add; p; p=p->next) { 831b7579f77SDag-Erling Smørgrav if(!sock_list_find(*list, &p->addr, p->len)) 832b7579f77SDag-Erling Smørgrav sock_list_insert(list, &p->addr, p->len, region); 833b7579f77SDag-Erling Smørgrav } 834b7579f77SDag-Erling Smørgrav } 835b7579f77SDag-Erling Smørgrav 836b7579f77SDag-Erling Smørgrav void 837b7579f77SDag-Erling Smørgrav log_crypto_err(const char* str) 838b7579f77SDag-Erling Smørgrav { 8398ed2b524SDag-Erling Smørgrav #ifdef HAVE_SSL 8400eefd307SCy Schubert log_crypto_err_code(str, ERR_get_error()); 8410eefd307SCy Schubert #else 8420eefd307SCy Schubert (void)str; 8430eefd307SCy Schubert #endif /* HAVE_SSL */ 8440eefd307SCy Schubert } 8450eefd307SCy Schubert 8460eefd307SCy Schubert void log_crypto_err_code(const char* str, unsigned long err) 8470eefd307SCy Schubert { 8480eefd307SCy Schubert #ifdef HAVE_SSL 849b7579f77SDag-Erling Smørgrav /* error:[error code]:[library name]:[function name]:[reason string] */ 850b7579f77SDag-Erling Smørgrav char buf[128]; 851b7579f77SDag-Erling Smørgrav unsigned long e; 8520eefd307SCy Schubert ERR_error_string_n(err, buf, sizeof(buf)); 853b7579f77SDag-Erling Smørgrav log_err("%s crypto %s", str, buf); 854b7579f77SDag-Erling Smørgrav while( (e=ERR_get_error()) ) { 855b7579f77SDag-Erling Smørgrav ERR_error_string_n(e, buf, sizeof(buf)); 856b7579f77SDag-Erling Smørgrav log_err("and additionally crypto %s", buf); 857b7579f77SDag-Erling Smørgrav } 8588ed2b524SDag-Erling Smørgrav #else 8598ed2b524SDag-Erling Smørgrav (void)str; 8600eefd307SCy Schubert (void)err; 8618ed2b524SDag-Erling Smørgrav #endif /* HAVE_SSL */ 862b7579f77SDag-Erling Smørgrav } 863b7579f77SDag-Erling Smørgrav 86425039b37SCy Schubert #ifdef HAVE_SSL 86525039b37SCy Schubert /** log certificate details */ 86625039b37SCy Schubert void 86725039b37SCy Schubert log_cert(unsigned level, const char* str, void* cert) 86825039b37SCy Schubert { 86925039b37SCy Schubert BIO* bio; 87025039b37SCy Schubert char nul = 0; 87125039b37SCy Schubert char* pp = NULL; 87225039b37SCy Schubert long len; 87325039b37SCy Schubert if(verbosity < level) return; 87425039b37SCy Schubert bio = BIO_new(BIO_s_mem()); 87525039b37SCy Schubert if(!bio) return; 87625039b37SCy Schubert X509_print_ex(bio, (X509*)cert, 0, (unsigned long)-1 87725039b37SCy Schubert ^(X509_FLAG_NO_SUBJECT 87825039b37SCy Schubert |X509_FLAG_NO_ISSUER|X509_FLAG_NO_VALIDITY 87925039b37SCy Schubert |X509_FLAG_NO_EXTENSIONS|X509_FLAG_NO_AUX 88025039b37SCy Schubert |X509_FLAG_NO_ATTRIBUTES)); 88125039b37SCy Schubert BIO_write(bio, &nul, (int)sizeof(nul)); 88225039b37SCy Schubert len = BIO_get_mem_data(bio, &pp); 88325039b37SCy Schubert if(len != 0 && pp) { 88425039b37SCy Schubert verbose(level, "%s: \n%s", str, pp); 88525039b37SCy Schubert } 88625039b37SCy Schubert BIO_free(bio); 88725039b37SCy Schubert } 88825039b37SCy Schubert #endif /* HAVE_SSL */ 88925039b37SCy Schubert 890*c0caa2e2SCy Schubert #if defined(HAVE_SSL) && defined(HAVE_NGHTTP2) 891*c0caa2e2SCy Schubert static int alpn_select_cb(SSL* ATTR_UNUSED(ssl), const unsigned char** out, 892*c0caa2e2SCy Schubert unsigned char* outlen, const unsigned char* in, unsigned int inlen, 893*c0caa2e2SCy Schubert void* ATTR_UNUSED(arg)) 894*c0caa2e2SCy Schubert { 895*c0caa2e2SCy Schubert int rv = nghttp2_select_next_protocol((unsigned char **)out, outlen, in, 896*c0caa2e2SCy Schubert inlen); 897*c0caa2e2SCy Schubert if(rv == -1) { 898*c0caa2e2SCy Schubert return SSL_TLSEXT_ERR_NOACK; 899*c0caa2e2SCy Schubert } 900*c0caa2e2SCy Schubert /* either http/1.1 or h2 selected */ 901*c0caa2e2SCy Schubert return SSL_TLSEXT_ERR_OK; 902*c0caa2e2SCy Schubert } 903*c0caa2e2SCy Schubert #endif 904*c0caa2e2SCy Schubert 905971980c3SDag-Erling Smørgrav int 906971980c3SDag-Erling Smørgrav listen_sslctx_setup(void* ctxt) 907971980c3SDag-Erling Smørgrav { 908971980c3SDag-Erling Smørgrav #ifdef HAVE_SSL 909971980c3SDag-Erling Smørgrav SSL_CTX* ctx = (SSL_CTX*)ctxt; 910971980c3SDag-Erling Smørgrav /* no SSLv2, SSLv3 because has defects */ 911091e9e46SCy Schubert #if SSL_OP_NO_SSLv2 != 0 912971980c3SDag-Erling Smørgrav if((SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv2) & SSL_OP_NO_SSLv2) 913971980c3SDag-Erling Smørgrav != SSL_OP_NO_SSLv2){ 914971980c3SDag-Erling Smørgrav log_crypto_err("could not set SSL_OP_NO_SSLv2"); 915971980c3SDag-Erling Smørgrav return 0; 916971980c3SDag-Erling Smørgrav } 917091e9e46SCy Schubert #endif 918971980c3SDag-Erling Smørgrav if((SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv3) & SSL_OP_NO_SSLv3) 919971980c3SDag-Erling Smørgrav != SSL_OP_NO_SSLv3){ 920971980c3SDag-Erling Smørgrav log_crypto_err("could not set SSL_OP_NO_SSLv3"); 921971980c3SDag-Erling Smørgrav return 0; 922971980c3SDag-Erling Smørgrav } 923971980c3SDag-Erling Smørgrav #if defined(SSL_OP_NO_TLSv1) && defined(SSL_OP_NO_TLSv1_1) 924971980c3SDag-Erling Smørgrav /* if we have tls 1.1 disable 1.0 */ 925971980c3SDag-Erling Smørgrav if((SSL_CTX_set_options(ctx, SSL_OP_NO_TLSv1) & SSL_OP_NO_TLSv1) 926971980c3SDag-Erling Smørgrav != SSL_OP_NO_TLSv1){ 927971980c3SDag-Erling Smørgrav log_crypto_err("could not set SSL_OP_NO_TLSv1"); 928971980c3SDag-Erling Smørgrav return 0; 929971980c3SDag-Erling Smørgrav } 930971980c3SDag-Erling Smørgrav #endif 931971980c3SDag-Erling Smørgrav #if defined(SSL_OP_NO_TLSv1_1) && defined(SSL_OP_NO_TLSv1_2) 932971980c3SDag-Erling Smørgrav /* if we have tls 1.2 disable 1.1 */ 933971980c3SDag-Erling Smørgrav if((SSL_CTX_set_options(ctx, SSL_OP_NO_TLSv1_1) & SSL_OP_NO_TLSv1_1) 934971980c3SDag-Erling Smørgrav != SSL_OP_NO_TLSv1_1){ 935971980c3SDag-Erling Smørgrav log_crypto_err("could not set SSL_OP_NO_TLSv1_1"); 936971980c3SDag-Erling Smørgrav return 0; 937971980c3SDag-Erling Smørgrav } 938971980c3SDag-Erling Smørgrav #endif 9390eefd307SCy Schubert #if defined(SSL_OP_NO_RENEGOTIATION) 9400eefd307SCy Schubert /* disable client renegotiation */ 9410eefd307SCy Schubert if((SSL_CTX_set_options(ctx, SSL_OP_NO_RENEGOTIATION) & 9420eefd307SCy Schubert SSL_OP_NO_RENEGOTIATION) != SSL_OP_NO_RENEGOTIATION) { 9430eefd307SCy Schubert log_crypto_err("could not set SSL_OP_NO_RENEGOTIATION"); 9440eefd307SCy Schubert return 0; 9450eefd307SCy Schubert } 9460eefd307SCy Schubert #endif 947971980c3SDag-Erling Smørgrav #if defined(SHA256_DIGEST_LENGTH) && defined(USE_ECDSA) 948971980c3SDag-Erling Smørgrav /* if we have sha256, set the cipher list to have no known vulns */ 94957bddd21SDag-Erling Smørgrav if(!SSL_CTX_set_cipher_list(ctx, "TLS13-CHACHA20-POLY1305-SHA256:TLS13-AES-256-GCM-SHA384:TLS13-AES-128-GCM-SHA256:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256")) 950971980c3SDag-Erling Smørgrav log_crypto_err("could not set cipher list with SSL_CTX_set_cipher_list"); 951971980c3SDag-Erling Smørgrav #endif 952971980c3SDag-Erling Smørgrav 953971980c3SDag-Erling Smørgrav if((SSL_CTX_set_options(ctx, SSL_OP_CIPHER_SERVER_PREFERENCE) & 954971980c3SDag-Erling Smørgrav SSL_OP_CIPHER_SERVER_PREFERENCE) != 955971980c3SDag-Erling Smørgrav SSL_OP_CIPHER_SERVER_PREFERENCE) { 956971980c3SDag-Erling Smørgrav log_crypto_err("could not set SSL_OP_CIPHER_SERVER_PREFERENCE"); 957971980c3SDag-Erling Smørgrav return 0; 958971980c3SDag-Erling Smørgrav } 959971980c3SDag-Erling Smørgrav 960971980c3SDag-Erling Smørgrav #ifdef HAVE_SSL_CTX_SET_SECURITY_LEVEL 961971980c3SDag-Erling Smørgrav SSL_CTX_set_security_level(ctx, 0); 962971980c3SDag-Erling Smørgrav #endif 963*c0caa2e2SCy Schubert #if defined(HAVE_SSL_CTX_SET_ALPN_SELECT_CB) && defined(HAVE_NGHTTP2) 964*c0caa2e2SCy Schubert SSL_CTX_set_alpn_select_cb(ctx, alpn_select_cb, NULL); 965*c0caa2e2SCy Schubert #endif 966971980c3SDag-Erling Smørgrav #else 967971980c3SDag-Erling Smørgrav (void)ctxt; 968971980c3SDag-Erling Smørgrav #endif /* HAVE_SSL */ 969971980c3SDag-Erling Smørgrav return 1; 970971980c3SDag-Erling Smørgrav } 971971980c3SDag-Erling Smørgrav 972971980c3SDag-Erling Smørgrav void 973971980c3SDag-Erling Smørgrav listen_sslctx_setup_2(void* ctxt) 974971980c3SDag-Erling Smørgrav { 975971980c3SDag-Erling Smørgrav #ifdef HAVE_SSL 976971980c3SDag-Erling Smørgrav SSL_CTX* ctx = (SSL_CTX*)ctxt; 977971980c3SDag-Erling Smørgrav (void)ctx; 978971980c3SDag-Erling Smørgrav #if HAVE_DECL_SSL_CTX_SET_ECDH_AUTO 979971980c3SDag-Erling Smørgrav if(!SSL_CTX_set_ecdh_auto(ctx,1)) { 980971980c3SDag-Erling Smørgrav log_crypto_err("Error in SSL_CTX_ecdh_auto, not enabling ECDHE"); 981971980c3SDag-Erling Smørgrav } 982971980c3SDag-Erling Smørgrav #elif defined(USE_ECDSA) 983971980c3SDag-Erling Smørgrav if(1) { 984971980c3SDag-Erling Smørgrav EC_KEY *ecdh = EC_KEY_new_by_curve_name (NID_X9_62_prime256v1); 985971980c3SDag-Erling Smørgrav if (!ecdh) { 986971980c3SDag-Erling Smørgrav log_crypto_err("could not find p256, not enabling ECDHE"); 987971980c3SDag-Erling Smørgrav } else { 988971980c3SDag-Erling Smørgrav if (1 != SSL_CTX_set_tmp_ecdh (ctx, ecdh)) { 989971980c3SDag-Erling Smørgrav log_crypto_err("Error in SSL_CTX_set_tmp_ecdh, not enabling ECDHE"); 990971980c3SDag-Erling Smørgrav } 991971980c3SDag-Erling Smørgrav EC_KEY_free (ecdh); 992971980c3SDag-Erling Smørgrav } 993971980c3SDag-Erling Smørgrav } 994971980c3SDag-Erling Smørgrav #endif 995971980c3SDag-Erling Smørgrav #else 996971980c3SDag-Erling Smørgrav (void)ctxt; 997971980c3SDag-Erling Smørgrav #endif /* HAVE_SSL */ 998971980c3SDag-Erling Smørgrav } 999971980c3SDag-Erling Smørgrav 1000b7579f77SDag-Erling Smørgrav void* listen_sslctx_create(char* key, char* pem, char* verifypem) 1001b7579f77SDag-Erling Smørgrav { 10028ed2b524SDag-Erling Smørgrav #ifdef HAVE_SSL 1003b7579f77SDag-Erling Smørgrav SSL_CTX* ctx = SSL_CTX_new(SSLv23_server_method()); 1004b7579f77SDag-Erling Smørgrav if(!ctx) { 1005b7579f77SDag-Erling Smørgrav log_crypto_err("could not SSL_CTX_new"); 1006b7579f77SDag-Erling Smørgrav return NULL; 1007b7579f77SDag-Erling Smørgrav } 1008e86b9096SDag-Erling Smørgrav if(!key || key[0] == 0) { 1009e86b9096SDag-Erling Smørgrav log_err("error: no tls-service-key file specified"); 1010e86b9096SDag-Erling Smørgrav SSL_CTX_free(ctx); 1011e86b9096SDag-Erling Smørgrav return NULL; 1012e86b9096SDag-Erling Smørgrav } 1013e86b9096SDag-Erling Smørgrav if(!pem || pem[0] == 0) { 1014e86b9096SDag-Erling Smørgrav log_err("error: no tls-service-pem file specified"); 1015e86b9096SDag-Erling Smørgrav SSL_CTX_free(ctx); 1016e86b9096SDag-Erling Smørgrav return NULL; 1017e86b9096SDag-Erling Smørgrav } 1018971980c3SDag-Erling Smørgrav if(!listen_sslctx_setup(ctx)) { 1019ff825849SDag-Erling Smørgrav SSL_CTX_free(ctx); 1020ff825849SDag-Erling Smørgrav return NULL; 1021ff825849SDag-Erling Smørgrav } 1022b75612f8SDag-Erling Smørgrav if(!SSL_CTX_use_certificate_chain_file(ctx, pem)) { 1023b7579f77SDag-Erling Smørgrav log_err("error for cert file: %s", pem); 1024b75612f8SDag-Erling Smørgrav log_crypto_err("error in SSL_CTX use_certificate_chain_file"); 1025b7579f77SDag-Erling Smørgrav SSL_CTX_free(ctx); 1026b7579f77SDag-Erling Smørgrav return NULL; 1027b7579f77SDag-Erling Smørgrav } 1028b7579f77SDag-Erling Smørgrav if(!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM)) { 1029b7579f77SDag-Erling Smørgrav log_err("error for private key file: %s", key); 1030b7579f77SDag-Erling Smørgrav log_crypto_err("Error in SSL_CTX use_PrivateKey_file"); 1031b7579f77SDag-Erling Smørgrav SSL_CTX_free(ctx); 1032b7579f77SDag-Erling Smørgrav return NULL; 1033b7579f77SDag-Erling Smørgrav } 1034b7579f77SDag-Erling Smørgrav if(!SSL_CTX_check_private_key(ctx)) { 1035b7579f77SDag-Erling Smørgrav log_err("error for key file: %s", key); 1036b7579f77SDag-Erling Smørgrav log_crypto_err("Error in SSL_CTX check_private_key"); 1037b7579f77SDag-Erling Smørgrav SSL_CTX_free(ctx); 1038b7579f77SDag-Erling Smørgrav return NULL; 1039b7579f77SDag-Erling Smørgrav } 1040971980c3SDag-Erling Smørgrav listen_sslctx_setup_2(ctx); 1041b7579f77SDag-Erling Smørgrav if(verifypem && verifypem[0]) { 1042b7579f77SDag-Erling Smørgrav if(!SSL_CTX_load_verify_locations(ctx, verifypem, NULL)) { 1043b7579f77SDag-Erling Smørgrav log_crypto_err("Error in SSL_CTX verify locations"); 1044b7579f77SDag-Erling Smørgrav SSL_CTX_free(ctx); 1045b7579f77SDag-Erling Smørgrav return NULL; 1046b7579f77SDag-Erling Smørgrav } 1047b7579f77SDag-Erling Smørgrav SSL_CTX_set_client_CA_list(ctx, SSL_load_client_CA_file( 1048b7579f77SDag-Erling Smørgrav verifypem)); 104925039b37SCy Schubert SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER|SSL_VERIFY_FAIL_IF_NO_PEER_CERT, NULL); 1050b7579f77SDag-Erling Smørgrav } 1051b7579f77SDag-Erling Smørgrav return ctx; 10528ed2b524SDag-Erling Smørgrav #else 10538ed2b524SDag-Erling Smørgrav (void)key; (void)pem; (void)verifypem; 10548ed2b524SDag-Erling Smørgrav return NULL; 10558ed2b524SDag-Erling Smørgrav #endif 1056b7579f77SDag-Erling Smørgrav } 1057b7579f77SDag-Erling Smørgrav 10583bd4df0aSDag-Erling Smørgrav #ifdef USE_WINSOCK 10593bd4df0aSDag-Erling Smørgrav /* For windows, the CA trust store is not read by openssl. 10603bd4df0aSDag-Erling Smørgrav Add code to open the trust store using wincrypt API and add 10613bd4df0aSDag-Erling Smørgrav the root certs into openssl trust store */ 10623bd4df0aSDag-Erling Smørgrav static int 10633bd4df0aSDag-Erling Smørgrav add_WIN_cacerts_to_openssl_store(SSL_CTX* tls_ctx) 10643bd4df0aSDag-Erling Smørgrav { 10653bd4df0aSDag-Erling Smørgrav HCERTSTORE hSystemStore; 10663bd4df0aSDag-Erling Smørgrav PCCERT_CONTEXT pTargetCert = NULL; 10673bd4df0aSDag-Erling Smørgrav X509_STORE* store; 10683bd4df0aSDag-Erling Smørgrav 10693bd4df0aSDag-Erling Smørgrav verbose(VERB_ALGO, "Adding Windows certificates from system root store to CA store"); 10703bd4df0aSDag-Erling Smørgrav 10713bd4df0aSDag-Erling Smørgrav /* load just once per context lifetime for this version 10723bd4df0aSDag-Erling Smørgrav TODO: dynamically update CA trust changes as they are available */ 10733bd4df0aSDag-Erling Smørgrav if (!tls_ctx) 10743bd4df0aSDag-Erling Smørgrav return 0; 10753bd4df0aSDag-Erling Smørgrav 10763bd4df0aSDag-Erling Smørgrav /* Call wincrypt's CertOpenStore to open the CA root store. */ 10773bd4df0aSDag-Erling Smørgrav 10783bd4df0aSDag-Erling Smørgrav if ((hSystemStore = CertOpenStore( 10793bd4df0aSDag-Erling Smørgrav CERT_STORE_PROV_SYSTEM, 10803bd4df0aSDag-Erling Smørgrav 0, 10813bd4df0aSDag-Erling Smørgrav 0, 10823bd4df0aSDag-Erling Smørgrav /* NOTE: mingw does not have this const: replace with 1 << 16 from code 10833bd4df0aSDag-Erling Smørgrav CERT_SYSTEM_STORE_CURRENT_USER, */ 10843bd4df0aSDag-Erling Smørgrav 1 << 16, 10853bd4df0aSDag-Erling Smørgrav L"root")) == 0) 10863bd4df0aSDag-Erling Smørgrav { 10873bd4df0aSDag-Erling Smørgrav return 0; 10883bd4df0aSDag-Erling Smørgrav } 10893bd4df0aSDag-Erling Smørgrav 10903bd4df0aSDag-Erling Smørgrav store = SSL_CTX_get_cert_store(tls_ctx); 10913bd4df0aSDag-Erling Smørgrav if (!store) 10923bd4df0aSDag-Erling Smørgrav return 0; 10933bd4df0aSDag-Erling Smørgrav 10943bd4df0aSDag-Erling Smørgrav /* failure if the CA store is empty or the call fails */ 10953bd4df0aSDag-Erling Smørgrav if ((pTargetCert = CertEnumCertificatesInStore( 10963bd4df0aSDag-Erling Smørgrav hSystemStore, pTargetCert)) == 0) { 10973bd4df0aSDag-Erling Smørgrav verbose(VERB_ALGO, "CA certificate store for Windows is empty."); 10983bd4df0aSDag-Erling Smørgrav return 0; 10993bd4df0aSDag-Erling Smørgrav } 11003bd4df0aSDag-Erling Smørgrav /* iterate over the windows cert store and add to openssl store */ 11013bd4df0aSDag-Erling Smørgrav do 11023bd4df0aSDag-Erling Smørgrav { 11033bd4df0aSDag-Erling Smørgrav X509 *cert1 = d2i_X509(NULL, 11043bd4df0aSDag-Erling Smørgrav (const unsigned char **)&pTargetCert->pbCertEncoded, 11053bd4df0aSDag-Erling Smørgrav pTargetCert->cbCertEncoded); 11063bd4df0aSDag-Erling Smørgrav if (!cert1) { 11073bd4df0aSDag-Erling Smørgrav /* return error if a cert fails */ 11083bd4df0aSDag-Erling Smørgrav verbose(VERB_ALGO, "%s %d:%s", 11093bd4df0aSDag-Erling Smørgrav "Unable to parse certificate in memory", 11103bd4df0aSDag-Erling Smørgrav (int)ERR_get_error(), ERR_error_string(ERR_get_error(), NULL)); 11113bd4df0aSDag-Erling Smørgrav return 0; 11123bd4df0aSDag-Erling Smørgrav } 11133bd4df0aSDag-Erling Smørgrav else { 11143bd4df0aSDag-Erling Smørgrav /* return error if a cert add to store fails */ 11153bd4df0aSDag-Erling Smørgrav if (X509_STORE_add_cert(store, cert1) == 0) { 11163bd4df0aSDag-Erling Smørgrav unsigned long error = ERR_peek_last_error(); 11173bd4df0aSDag-Erling Smørgrav 11183bd4df0aSDag-Erling Smørgrav /* Ignore error X509_R_CERT_ALREADY_IN_HASH_TABLE which means the 11193bd4df0aSDag-Erling Smørgrav * certificate is already in the store. */ 11203bd4df0aSDag-Erling Smørgrav if(ERR_GET_LIB(error) != ERR_LIB_X509 || 11213bd4df0aSDag-Erling Smørgrav ERR_GET_REASON(error) != X509_R_CERT_ALREADY_IN_HASH_TABLE) { 11223bd4df0aSDag-Erling Smørgrav verbose(VERB_ALGO, "%s %d:%s\n", 11233bd4df0aSDag-Erling Smørgrav "Error adding certificate", (int)ERR_get_error(), 11243bd4df0aSDag-Erling Smørgrav ERR_error_string(ERR_get_error(), NULL)); 11253bd4df0aSDag-Erling Smørgrav X509_free(cert1); 11263bd4df0aSDag-Erling Smørgrav return 0; 11273bd4df0aSDag-Erling Smørgrav } 11283bd4df0aSDag-Erling Smørgrav } 11293bd4df0aSDag-Erling Smørgrav X509_free(cert1); 11303bd4df0aSDag-Erling Smørgrav } 11313bd4df0aSDag-Erling Smørgrav } while ((pTargetCert = CertEnumCertificatesInStore( 11323bd4df0aSDag-Erling Smørgrav hSystemStore, pTargetCert)) != 0); 11333bd4df0aSDag-Erling Smørgrav 11343bd4df0aSDag-Erling Smørgrav /* Clean up memory and quit. */ 11353bd4df0aSDag-Erling Smørgrav if (pTargetCert) 11363bd4df0aSDag-Erling Smørgrav CertFreeCertificateContext(pTargetCert); 11373bd4df0aSDag-Erling Smørgrav if (hSystemStore) 11383bd4df0aSDag-Erling Smørgrav { 11393bd4df0aSDag-Erling Smørgrav if (!CertCloseStore( 11403bd4df0aSDag-Erling Smørgrav hSystemStore, 0)) 11413bd4df0aSDag-Erling Smørgrav return 0; 11423bd4df0aSDag-Erling Smørgrav } 11433bd4df0aSDag-Erling Smørgrav verbose(VERB_ALGO, "Completed adding Windows certificates to CA store successfully"); 11443bd4df0aSDag-Erling Smørgrav return 1; 11453bd4df0aSDag-Erling Smørgrav } 11463bd4df0aSDag-Erling Smørgrav #endif /* USE_WINSOCK */ 11473bd4df0aSDag-Erling Smørgrav 11483bd4df0aSDag-Erling Smørgrav void* connect_sslctx_create(char* key, char* pem, char* verifypem, int wincert) 1149b7579f77SDag-Erling Smørgrav { 11508ed2b524SDag-Erling Smørgrav #ifdef HAVE_SSL 1151b7579f77SDag-Erling Smørgrav SSL_CTX* ctx = SSL_CTX_new(SSLv23_client_method()); 1152b7579f77SDag-Erling Smørgrav if(!ctx) { 1153b7579f77SDag-Erling Smørgrav log_crypto_err("could not allocate SSL_CTX pointer"); 1154b7579f77SDag-Erling Smørgrav return NULL; 1155b7579f77SDag-Erling Smørgrav } 1156091e9e46SCy Schubert #if SSL_OP_NO_SSLv2 != 0 115705ab2901SDag-Erling Smørgrav if((SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv2) & SSL_OP_NO_SSLv2) 115805ab2901SDag-Erling Smørgrav != SSL_OP_NO_SSLv2) { 1159b7579f77SDag-Erling Smørgrav log_crypto_err("could not set SSL_OP_NO_SSLv2"); 1160b7579f77SDag-Erling Smørgrav SSL_CTX_free(ctx); 1161b7579f77SDag-Erling Smørgrav return NULL; 1162b7579f77SDag-Erling Smørgrav } 1163091e9e46SCy Schubert #endif 116405ab2901SDag-Erling Smørgrav if((SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv3) & SSL_OP_NO_SSLv3) 116505ab2901SDag-Erling Smørgrav != SSL_OP_NO_SSLv3) { 1166ff825849SDag-Erling Smørgrav log_crypto_err("could not set SSL_OP_NO_SSLv3"); 1167ff825849SDag-Erling Smørgrav SSL_CTX_free(ctx); 1168ff825849SDag-Erling Smørgrav return NULL; 1169ff825849SDag-Erling Smørgrav } 11700eefd307SCy Schubert #if defined(SSL_OP_NO_RENEGOTIATION) 11710eefd307SCy Schubert /* disable client renegotiation */ 11720eefd307SCy Schubert if((SSL_CTX_set_options(ctx, SSL_OP_NO_RENEGOTIATION) & 11730eefd307SCy Schubert SSL_OP_NO_RENEGOTIATION) != SSL_OP_NO_RENEGOTIATION) { 11740eefd307SCy Schubert log_crypto_err("could not set SSL_OP_NO_RENEGOTIATION"); 11750eefd307SCy Schubert return 0; 11760eefd307SCy Schubert } 11770eefd307SCy Schubert #endif 1178b7579f77SDag-Erling Smørgrav if(key && key[0]) { 1179b75612f8SDag-Erling Smørgrav if(!SSL_CTX_use_certificate_chain_file(ctx, pem)) { 1180b7579f77SDag-Erling Smørgrav log_err("error in client certificate %s", pem); 1181b7579f77SDag-Erling Smørgrav log_crypto_err("error in certificate file"); 1182b7579f77SDag-Erling Smørgrav SSL_CTX_free(ctx); 1183b7579f77SDag-Erling Smørgrav return NULL; 1184b7579f77SDag-Erling Smørgrav } 1185b7579f77SDag-Erling Smørgrav if(!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM)) { 1186b7579f77SDag-Erling Smørgrav log_err("error in client private key %s", key); 1187b7579f77SDag-Erling Smørgrav log_crypto_err("error in key file"); 1188b7579f77SDag-Erling Smørgrav SSL_CTX_free(ctx); 1189b7579f77SDag-Erling Smørgrav return NULL; 1190b7579f77SDag-Erling Smørgrav } 1191b7579f77SDag-Erling Smørgrav if(!SSL_CTX_check_private_key(ctx)) { 1192b7579f77SDag-Erling Smørgrav log_err("error in client key %s", key); 1193b7579f77SDag-Erling Smørgrav log_crypto_err("error in SSL_CTX_check_private_key"); 1194b7579f77SDag-Erling Smørgrav SSL_CTX_free(ctx); 1195b7579f77SDag-Erling Smørgrav return NULL; 1196b7579f77SDag-Erling Smørgrav } 1197b7579f77SDag-Erling Smørgrav } 11983bd4df0aSDag-Erling Smørgrav if((verifypem && verifypem[0]) || wincert) { 1199b7579f77SDag-Erling Smørgrav if(verifypem && verifypem[0]) { 1200ff825849SDag-Erling Smørgrav if(!SSL_CTX_load_verify_locations(ctx, verifypem, NULL)) { 1201b7579f77SDag-Erling Smørgrav log_crypto_err("error in SSL_CTX verify"); 1202b7579f77SDag-Erling Smørgrav SSL_CTX_free(ctx); 1203b7579f77SDag-Erling Smørgrav return NULL; 1204b7579f77SDag-Erling Smørgrav } 12053bd4df0aSDag-Erling Smørgrav } 12063bd4df0aSDag-Erling Smørgrav #ifdef USE_WINSOCK 12073bd4df0aSDag-Erling Smørgrav if(wincert) { 12083bd4df0aSDag-Erling Smørgrav if(!add_WIN_cacerts_to_openssl_store(ctx)) { 12093bd4df0aSDag-Erling Smørgrav log_crypto_err("error in add_WIN_cacerts_to_openssl_store"); 12103bd4df0aSDag-Erling Smørgrav SSL_CTX_free(ctx); 12113bd4df0aSDag-Erling Smørgrav return NULL; 12123bd4df0aSDag-Erling Smørgrav } 12133bd4df0aSDag-Erling Smørgrav } 12143bd4df0aSDag-Erling Smørgrav #else 12153bd4df0aSDag-Erling Smørgrav (void)wincert; 12163bd4df0aSDag-Erling Smørgrav #endif 1217b7579f77SDag-Erling Smørgrav SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, NULL); 1218b7579f77SDag-Erling Smørgrav } 1219b7579f77SDag-Erling Smørgrav return ctx; 12208ed2b524SDag-Erling Smørgrav #else 12213bd4df0aSDag-Erling Smørgrav (void)key; (void)pem; (void)verifypem; (void)wincert; 12228ed2b524SDag-Erling Smørgrav return NULL; 12238ed2b524SDag-Erling Smørgrav #endif 1224b7579f77SDag-Erling Smørgrav } 1225b7579f77SDag-Erling Smørgrav 1226b7579f77SDag-Erling Smørgrav void* incoming_ssl_fd(void* sslctx, int fd) 1227b7579f77SDag-Erling Smørgrav { 12288ed2b524SDag-Erling Smørgrav #ifdef HAVE_SSL 1229b7579f77SDag-Erling Smørgrav SSL* ssl = SSL_new((SSL_CTX*)sslctx); 1230b7579f77SDag-Erling Smørgrav if(!ssl) { 1231b7579f77SDag-Erling Smørgrav log_crypto_err("could not SSL_new"); 1232b7579f77SDag-Erling Smørgrav return NULL; 1233b7579f77SDag-Erling Smørgrav } 1234b7579f77SDag-Erling Smørgrav SSL_set_accept_state(ssl); 12350eefd307SCy Schubert (void)SSL_set_mode(ssl, (long)SSL_MODE_AUTO_RETRY); 1236b7579f77SDag-Erling Smørgrav if(!SSL_set_fd(ssl, fd)) { 1237b7579f77SDag-Erling Smørgrav log_crypto_err("could not SSL_set_fd"); 1238b7579f77SDag-Erling Smørgrav SSL_free(ssl); 1239b7579f77SDag-Erling Smørgrav return NULL; 1240b7579f77SDag-Erling Smørgrav } 1241b7579f77SDag-Erling Smørgrav return ssl; 12428ed2b524SDag-Erling Smørgrav #else 12438ed2b524SDag-Erling Smørgrav (void)sslctx; (void)fd; 12448ed2b524SDag-Erling Smørgrav return NULL; 12458ed2b524SDag-Erling Smørgrav #endif 1246b7579f77SDag-Erling Smørgrav } 1247b7579f77SDag-Erling Smørgrav 1248b7579f77SDag-Erling Smørgrav void* outgoing_ssl_fd(void* sslctx, int fd) 1249b7579f77SDag-Erling Smørgrav { 12508ed2b524SDag-Erling Smørgrav #ifdef HAVE_SSL 1251b7579f77SDag-Erling Smørgrav SSL* ssl = SSL_new((SSL_CTX*)sslctx); 1252b7579f77SDag-Erling Smørgrav if(!ssl) { 1253b7579f77SDag-Erling Smørgrav log_crypto_err("could not SSL_new"); 1254b7579f77SDag-Erling Smørgrav return NULL; 1255b7579f77SDag-Erling Smørgrav } 1256b7579f77SDag-Erling Smørgrav SSL_set_connect_state(ssl); 12570eefd307SCy Schubert (void)SSL_set_mode(ssl, (long)SSL_MODE_AUTO_RETRY); 1258b7579f77SDag-Erling Smørgrav if(!SSL_set_fd(ssl, fd)) { 1259b7579f77SDag-Erling Smørgrav log_crypto_err("could not SSL_set_fd"); 1260b7579f77SDag-Erling Smørgrav SSL_free(ssl); 1261b7579f77SDag-Erling Smørgrav return NULL; 1262b7579f77SDag-Erling Smørgrav } 1263b7579f77SDag-Erling Smørgrav return ssl; 12648ed2b524SDag-Erling Smørgrav #else 12658ed2b524SDag-Erling Smørgrav (void)sslctx; (void)fd; 12668ed2b524SDag-Erling Smørgrav return NULL; 12678ed2b524SDag-Erling Smørgrav #endif 1268b7579f77SDag-Erling Smørgrav } 12698ed2b524SDag-Erling Smørgrav 127025039b37SCy Schubert int check_auth_name_for_ssl(char* auth_name) 127125039b37SCy Schubert { 127225039b37SCy Schubert if(!auth_name) return 1; 127325039b37SCy Schubert #if defined(HAVE_SSL) && !defined(HAVE_SSL_SET1_HOST) && !defined(HAVE_X509_VERIFY_PARAM_SET1_HOST) 127425039b37SCy Schubert log_err("the query has an auth_name %s, but libssl has no call to " 127525039b37SCy Schubert "perform TLS authentication. Remove that name from config " 127625039b37SCy Schubert "or upgrade the ssl crypto library.", auth_name); 127725039b37SCy Schubert return 0; 127825039b37SCy Schubert #else 127925039b37SCy Schubert return 1; 128025039b37SCy Schubert #endif 128125039b37SCy Schubert } 128225039b37SCy Schubert 128325039b37SCy Schubert /** set the authname on an SSL structure, SSL* ssl */ 128425039b37SCy Schubert int set_auth_name_on_ssl(void* ssl, char* auth_name, int use_sni) 128525039b37SCy Schubert { 128625039b37SCy Schubert if(!auth_name) return 1; 128725039b37SCy Schubert #ifdef HAVE_SSL 128825039b37SCy Schubert if(use_sni) { 128925039b37SCy Schubert (void)SSL_set_tlsext_host_name(ssl, auth_name); 129025039b37SCy Schubert } 129125039b37SCy Schubert #else 129225039b37SCy Schubert (void)ssl; 129325039b37SCy Schubert (void)use_sni; 129425039b37SCy Schubert #endif 129525039b37SCy Schubert #ifdef HAVE_SSL_SET1_HOST 129625039b37SCy Schubert SSL_set_verify(ssl, SSL_VERIFY_PEER, NULL); 129725039b37SCy Schubert /* setting the hostname makes openssl verify the 129825039b37SCy Schubert * host name in the x509 certificate in the 129925039b37SCy Schubert * SSL connection*/ 130025039b37SCy Schubert if(!SSL_set1_host(ssl, auth_name)) { 130125039b37SCy Schubert log_err("SSL_set1_host failed"); 130225039b37SCy Schubert return 0; 130325039b37SCy Schubert } 130425039b37SCy Schubert #elif defined(HAVE_X509_VERIFY_PARAM_SET1_HOST) 130525039b37SCy Schubert /* openssl 1.0.2 has this function that can be used for 130625039b37SCy Schubert * set1_host like verification */ 130725039b37SCy Schubert if(auth_name) { 130825039b37SCy Schubert X509_VERIFY_PARAM* param = SSL_get0_param(ssl); 130925039b37SCy Schubert # ifdef X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS 131025039b37SCy Schubert X509_VERIFY_PARAM_set_hostflags(param, X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS); 131125039b37SCy Schubert # endif 131225039b37SCy Schubert if(!X509_VERIFY_PARAM_set1_host(param, auth_name, strlen(auth_name))) { 131325039b37SCy Schubert log_err("X509_VERIFY_PARAM_set1_host failed"); 131425039b37SCy Schubert return 0; 131525039b37SCy Schubert } 131625039b37SCy Schubert SSL_set_verify(ssl, SSL_VERIFY_PEER, NULL); 131725039b37SCy Schubert } 131825039b37SCy Schubert #else 131925039b37SCy Schubert verbose(VERB_ALGO, "the query has an auth_name, but libssl has no call to perform TLS authentication"); 132025039b37SCy Schubert #endif /* HAVE_SSL_SET1_HOST */ 132125039b37SCy Schubert return 1; 132225039b37SCy Schubert } 132325039b37SCy Schubert 1324b5663de9SDag-Erling Smørgrav #if defined(HAVE_SSL) && defined(OPENSSL_THREADS) && !defined(THREADS_DISABLED) && defined(CRYPTO_LOCK) && OPENSSL_VERSION_NUMBER < 0x10100000L 13258ed2b524SDag-Erling Smørgrav /** global lock list for openssl locks */ 13263005e0a3SDag-Erling Smørgrav static lock_basic_type *ub_openssl_locks = NULL; 13278ed2b524SDag-Erling Smørgrav 13288ed2b524SDag-Erling Smørgrav /** callback that gets thread id for openssl */ 1329e86b9096SDag-Erling Smørgrav #ifdef HAVE_CRYPTO_THREADID_SET_CALLBACK 1330e86b9096SDag-Erling Smørgrav static void 1331e86b9096SDag-Erling Smørgrav ub_crypto_id_cb(CRYPTO_THREADID *id) 1332e86b9096SDag-Erling Smørgrav { 1333e86b9096SDag-Erling Smørgrav CRYPTO_THREADID_set_numeric(id, (unsigned long)log_thread_get()); 1334e86b9096SDag-Erling Smørgrav } 1335e86b9096SDag-Erling Smørgrav #else 13368ed2b524SDag-Erling Smørgrav static unsigned long 13378ed2b524SDag-Erling Smørgrav ub_crypto_id_cb(void) 13388ed2b524SDag-Erling Smørgrav { 133909a3aaf3SDag-Erling Smørgrav return (unsigned long)log_thread_get(); 13408ed2b524SDag-Erling Smørgrav } 1341e86b9096SDag-Erling Smørgrav #endif 13428ed2b524SDag-Erling Smørgrav 13438ed2b524SDag-Erling Smørgrav static void 13448ed2b524SDag-Erling Smørgrav ub_crypto_lock_cb(int mode, int type, const char *ATTR_UNUSED(file), 13458ed2b524SDag-Erling Smørgrav int ATTR_UNUSED(line)) 13468ed2b524SDag-Erling Smørgrav { 13478ed2b524SDag-Erling Smørgrav if((mode&CRYPTO_LOCK)) { 13488ed2b524SDag-Erling Smørgrav lock_basic_lock(&ub_openssl_locks[type]); 13498ed2b524SDag-Erling Smørgrav } else { 13508ed2b524SDag-Erling Smørgrav lock_basic_unlock(&ub_openssl_locks[type]); 13518ed2b524SDag-Erling Smørgrav } 13528ed2b524SDag-Erling Smørgrav } 13538ed2b524SDag-Erling Smørgrav #endif /* OPENSSL_THREADS */ 13548ed2b524SDag-Erling Smørgrav 13558ed2b524SDag-Erling Smørgrav int ub_openssl_lock_init(void) 13568ed2b524SDag-Erling Smørgrav { 1357b5663de9SDag-Erling Smørgrav #if defined(HAVE_SSL) && defined(OPENSSL_THREADS) && !defined(THREADS_DISABLED) && defined(CRYPTO_LOCK) && OPENSSL_VERSION_NUMBER < 0x10100000L 13588ed2b524SDag-Erling Smørgrav int i; 13593005e0a3SDag-Erling Smørgrav ub_openssl_locks = (lock_basic_type*)reallocarray( 13603005e0a3SDag-Erling Smørgrav NULL, (size_t)CRYPTO_num_locks(), sizeof(lock_basic_type)); 13618ed2b524SDag-Erling Smørgrav if(!ub_openssl_locks) 13628ed2b524SDag-Erling Smørgrav return 0; 13638ed2b524SDag-Erling Smørgrav for(i=0; i<CRYPTO_num_locks(); i++) { 13648ed2b524SDag-Erling Smørgrav lock_basic_init(&ub_openssl_locks[i]); 13658ed2b524SDag-Erling Smørgrav } 1366e86b9096SDag-Erling Smørgrav # ifdef HAVE_CRYPTO_THREADID_SET_CALLBACK 1367e86b9096SDag-Erling Smørgrav CRYPTO_THREADID_set_callback(&ub_crypto_id_cb); 1368e86b9096SDag-Erling Smørgrav # else 13698ed2b524SDag-Erling Smørgrav CRYPTO_set_id_callback(&ub_crypto_id_cb); 1370e86b9096SDag-Erling Smørgrav # endif 13718ed2b524SDag-Erling Smørgrav CRYPTO_set_locking_callback(&ub_crypto_lock_cb); 13728ed2b524SDag-Erling Smørgrav #endif /* OPENSSL_THREADS */ 13738ed2b524SDag-Erling Smørgrav return 1; 13748ed2b524SDag-Erling Smørgrav } 13758ed2b524SDag-Erling Smørgrav 13768ed2b524SDag-Erling Smørgrav void ub_openssl_lock_delete(void) 13778ed2b524SDag-Erling Smørgrav { 1378b5663de9SDag-Erling Smørgrav #if defined(HAVE_SSL) && defined(OPENSSL_THREADS) && !defined(THREADS_DISABLED) && defined(CRYPTO_LOCK) && OPENSSL_VERSION_NUMBER < 0x10100000L 13798ed2b524SDag-Erling Smørgrav int i; 13808ed2b524SDag-Erling Smørgrav if(!ub_openssl_locks) 13818ed2b524SDag-Erling Smørgrav return; 1382e86b9096SDag-Erling Smørgrav # ifdef HAVE_CRYPTO_THREADID_SET_CALLBACK 1383e86b9096SDag-Erling Smørgrav CRYPTO_THREADID_set_callback(NULL); 1384e86b9096SDag-Erling Smørgrav # else 13858ed2b524SDag-Erling Smørgrav CRYPTO_set_id_callback(NULL); 1386e86b9096SDag-Erling Smørgrav # endif 13878ed2b524SDag-Erling Smørgrav CRYPTO_set_locking_callback(NULL); 13888ed2b524SDag-Erling Smørgrav for(i=0; i<CRYPTO_num_locks(); i++) { 13898ed2b524SDag-Erling Smørgrav lock_basic_destroy(&ub_openssl_locks[i]); 13908ed2b524SDag-Erling Smørgrav } 13918ed2b524SDag-Erling Smørgrav free(ub_openssl_locks); 13928ed2b524SDag-Erling Smørgrav #endif /* OPENSSL_THREADS */ 13938ed2b524SDag-Erling Smørgrav } 13948ed2b524SDag-Erling Smørgrav 1395e86b9096SDag-Erling Smørgrav int listen_sslctx_setup_ticket_keys(void* sslctx, struct config_strlist* tls_session_ticket_keys) { 1396e86b9096SDag-Erling Smørgrav #ifdef HAVE_SSL 1397e86b9096SDag-Erling Smørgrav size_t s = 1; 1398e86b9096SDag-Erling Smørgrav struct config_strlist* p; 1399e86b9096SDag-Erling Smørgrav struct tls_session_ticket_key *keys; 1400e86b9096SDag-Erling Smørgrav for(p = tls_session_ticket_keys; p; p = p->next) { 1401e86b9096SDag-Erling Smørgrav s++; 1402e86b9096SDag-Erling Smørgrav } 1403e86b9096SDag-Erling Smørgrav keys = calloc(s, sizeof(struct tls_session_ticket_key)); 1404091e9e46SCy Schubert if(!keys) 1405091e9e46SCy Schubert return 0; 1406e86b9096SDag-Erling Smørgrav memset(keys, 0, s*sizeof(*keys)); 1407e86b9096SDag-Erling Smørgrav ticket_keys = keys; 1408e86b9096SDag-Erling Smørgrav 1409e86b9096SDag-Erling Smørgrav for(p = tls_session_ticket_keys; p; p = p->next) { 1410e86b9096SDag-Erling Smørgrav size_t n; 1411091e9e46SCy Schubert unsigned char *data; 1412091e9e46SCy Schubert FILE *f; 1413091e9e46SCy Schubert 1414091e9e46SCy Schubert data = (unsigned char *)malloc(80); 1415091e9e46SCy Schubert if(!data) 1416091e9e46SCy Schubert return 0; 1417091e9e46SCy Schubert 141825039b37SCy Schubert f = fopen(p->str, "rb"); 1419e86b9096SDag-Erling Smørgrav if(!f) { 1420e86b9096SDag-Erling Smørgrav log_err("could not read tls-session-ticket-key %s: %s", p->str, strerror(errno)); 1421e86b9096SDag-Erling Smørgrav free(data); 1422e86b9096SDag-Erling Smørgrav return 0; 1423e86b9096SDag-Erling Smørgrav } 1424e86b9096SDag-Erling Smørgrav n = fread(data, 1, 80, f); 1425e86b9096SDag-Erling Smørgrav fclose(f); 1426e86b9096SDag-Erling Smørgrav 1427e86b9096SDag-Erling Smørgrav if(n != 80) { 1428e86b9096SDag-Erling Smørgrav log_err("tls-session-ticket-key %s is %d bytes, must be 80 bytes", p->str, (int)n); 1429e86b9096SDag-Erling Smørgrav free(data); 1430e86b9096SDag-Erling Smørgrav return 0; 1431e86b9096SDag-Erling Smørgrav } 1432e86b9096SDag-Erling Smørgrav verbose(VERB_OPS, "read tls-session-ticket-key: %s", p->str); 1433e86b9096SDag-Erling Smørgrav 1434e86b9096SDag-Erling Smørgrav keys->key_name = data; 1435e86b9096SDag-Erling Smørgrav keys->aes_key = data + 16; 1436e86b9096SDag-Erling Smørgrav keys->hmac_key = data + 48; 1437e86b9096SDag-Erling Smørgrav keys++; 1438e86b9096SDag-Erling Smørgrav } 1439e86b9096SDag-Erling Smørgrav /* terminate array with NULL key name entry */ 1440e86b9096SDag-Erling Smørgrav keys->key_name = NULL; 144125039b37SCy Schubert # ifdef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB 144225039b37SCy Schubert if(SSL_CTX_set_tlsext_ticket_key_evp_cb(sslctx, tls_session_ticket_key_cb) == 0) { 144325039b37SCy Schubert log_err("no support for TLS session ticket"); 144425039b37SCy Schubert return 0; 144525039b37SCy Schubert } 144625039b37SCy Schubert # else 1447e86b9096SDag-Erling Smørgrav if(SSL_CTX_set_tlsext_ticket_key_cb(sslctx, tls_session_ticket_key_cb) == 0) { 1448e86b9096SDag-Erling Smørgrav log_err("no support for TLS session ticket"); 1449e86b9096SDag-Erling Smørgrav return 0; 1450e86b9096SDag-Erling Smørgrav } 145125039b37SCy Schubert # endif 1452e86b9096SDag-Erling Smørgrav return 1; 1453e86b9096SDag-Erling Smørgrav #else 1454e86b9096SDag-Erling Smørgrav (void)sslctx; 1455e86b9096SDag-Erling Smørgrav (void)tls_session_ticket_keys; 1456e86b9096SDag-Erling Smørgrav return 0; 1457e86b9096SDag-Erling Smørgrav #endif 1458e86b9096SDag-Erling Smørgrav 1459e86b9096SDag-Erling Smørgrav } 1460e86b9096SDag-Erling Smørgrav 146125039b37SCy Schubert #ifdef HAVE_SSL 146225039b37SCy Schubert int tls_session_ticket_key_cb(SSL *ATTR_UNUSED(sslctx), unsigned char* key_name, 146325039b37SCy Schubert unsigned char* iv, EVP_CIPHER_CTX *evp_sctx, 146425039b37SCy Schubert #ifdef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB 146525039b37SCy Schubert EVP_MAC_CTX *hmac_ctx, 146625039b37SCy Schubert #else 146725039b37SCy Schubert HMAC_CTX* hmac_ctx, 146825039b37SCy Schubert #endif 146925039b37SCy Schubert int enc) 1470e86b9096SDag-Erling Smørgrav { 1471e86b9096SDag-Erling Smørgrav #ifdef HAVE_SSL 147225039b37SCy Schubert # ifdef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB 147325039b37SCy Schubert OSSL_PARAM params[3]; 147425039b37SCy Schubert # else 1475e86b9096SDag-Erling Smørgrav const EVP_MD *digest; 147625039b37SCy Schubert # endif 1477e86b9096SDag-Erling Smørgrav const EVP_CIPHER *cipher; 1478e86b9096SDag-Erling Smørgrav int evp_cipher_length; 147925039b37SCy Schubert # ifndef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB 1480e86b9096SDag-Erling Smørgrav digest = EVP_sha256(); 148125039b37SCy Schubert # endif 1482e86b9096SDag-Erling Smørgrav cipher = EVP_aes_256_cbc(); 1483e86b9096SDag-Erling Smørgrav evp_cipher_length = EVP_CIPHER_iv_length(cipher); 1484e86b9096SDag-Erling Smørgrav if( enc == 1 ) { 1485e86b9096SDag-Erling Smørgrav /* encrypt */ 1486e86b9096SDag-Erling Smørgrav verbose(VERB_CLIENT, "start session encrypt"); 1487e86b9096SDag-Erling Smørgrav memcpy(key_name, ticket_keys->key_name, 16); 1488e86b9096SDag-Erling Smørgrav if (RAND_bytes(iv, evp_cipher_length) != 1) { 1489e86b9096SDag-Erling Smørgrav verbose(VERB_CLIENT, "RAND_bytes failed"); 1490e86b9096SDag-Erling Smørgrav return -1; 1491e86b9096SDag-Erling Smørgrav } 1492e86b9096SDag-Erling Smørgrav if (EVP_EncryptInit_ex(evp_sctx, cipher, NULL, ticket_keys->aes_key, iv) != 1) { 1493e86b9096SDag-Erling Smørgrav verbose(VERB_CLIENT, "EVP_EncryptInit_ex failed"); 1494e86b9096SDag-Erling Smørgrav return -1; 1495e86b9096SDag-Erling Smørgrav } 149625039b37SCy Schubert #ifdef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB 149725039b37SCy Schubert params[0] = OSSL_PARAM_construct_octet_string(OSSL_MAC_PARAM_KEY, 149825039b37SCy Schubert ticket_keys->hmac_key, 32); 149925039b37SCy Schubert params[1] = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_DIGEST, 150025039b37SCy Schubert "sha256", 0); 150125039b37SCy Schubert params[2] = OSSL_PARAM_construct_end(); 1502*c0caa2e2SCy Schubert #ifdef HAVE_EVP_MAC_CTX_SET_PARAMS 1503*c0caa2e2SCy Schubert EVP_MAC_CTX_set_params(hmac_ctx, params); 1504*c0caa2e2SCy Schubert #else 150525039b37SCy Schubert EVP_MAC_set_ctx_params(hmac_ctx, params); 1506*c0caa2e2SCy Schubert #endif 150725039b37SCy Schubert #elif !defined(HMAC_INIT_EX_RETURNS_VOID) 1508e86b9096SDag-Erling Smørgrav if (HMAC_Init_ex(hmac_ctx, ticket_keys->hmac_key, 32, digest, NULL) != 1) { 1509e86b9096SDag-Erling Smørgrav verbose(VERB_CLIENT, "HMAC_Init_ex failed"); 1510e86b9096SDag-Erling Smørgrav return -1; 1511e86b9096SDag-Erling Smørgrav } 15120eefd307SCy Schubert #else 15130eefd307SCy Schubert HMAC_Init_ex(hmac_ctx, ticket_keys->hmac_key, 32, digest, NULL); 15140eefd307SCy Schubert #endif 1515e86b9096SDag-Erling Smørgrav return 1; 1516e86b9096SDag-Erling Smørgrav } else if (enc == 0) { 1517e86b9096SDag-Erling Smørgrav /* decrypt */ 1518e86b9096SDag-Erling Smørgrav struct tls_session_ticket_key *key; 1519e86b9096SDag-Erling Smørgrav verbose(VERB_CLIENT, "start session decrypt"); 1520e86b9096SDag-Erling Smørgrav for(key = ticket_keys; key->key_name != NULL; key++) { 1521e86b9096SDag-Erling Smørgrav if (!memcmp(key_name, key->key_name, 16)) { 1522e86b9096SDag-Erling Smørgrav verbose(VERB_CLIENT, "Found session_key"); 1523e86b9096SDag-Erling Smørgrav break; 1524e86b9096SDag-Erling Smørgrav } 1525e86b9096SDag-Erling Smørgrav } 1526e86b9096SDag-Erling Smørgrav if(key->key_name == NULL) { 1527e86b9096SDag-Erling Smørgrav verbose(VERB_CLIENT, "Not found session_key"); 1528e86b9096SDag-Erling Smørgrav return 0; 1529e86b9096SDag-Erling Smørgrav } 1530e86b9096SDag-Erling Smørgrav 153125039b37SCy Schubert #ifdef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB 153225039b37SCy Schubert params[0] = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_KEY, 153325039b37SCy Schubert key->hmac_key, 32); 153425039b37SCy Schubert params[1] = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_DIGEST, 153525039b37SCy Schubert "sha256", 0); 153625039b37SCy Schubert params[2] = OSSL_PARAM_construct_end(); 1537*c0caa2e2SCy Schubert #ifdef HAVE_EVP_MAC_CTX_SET_PARAMS 1538*c0caa2e2SCy Schubert EVP_MAC_CTX_set_params(hmac_ctx, params); 1539*c0caa2e2SCy Schubert #else 154025039b37SCy Schubert EVP_MAC_set_ctx_params(hmac_ctx, params); 1541*c0caa2e2SCy Schubert #endif 154225039b37SCy Schubert #elif !defined(HMAC_INIT_EX_RETURNS_VOID) 1543e86b9096SDag-Erling Smørgrav if (HMAC_Init_ex(hmac_ctx, key->hmac_key, 32, digest, NULL) != 1) { 1544e86b9096SDag-Erling Smørgrav verbose(VERB_CLIENT, "HMAC_Init_ex failed"); 1545e86b9096SDag-Erling Smørgrav return -1; 1546e86b9096SDag-Erling Smørgrav } 15470eefd307SCy Schubert #else 15480eefd307SCy Schubert HMAC_Init_ex(hmac_ctx, key->hmac_key, 32, digest, NULL); 15490eefd307SCy Schubert #endif 1550e86b9096SDag-Erling Smørgrav if (EVP_DecryptInit_ex(evp_sctx, cipher, NULL, key->aes_key, iv) != 1) { 1551e86b9096SDag-Erling Smørgrav log_err("EVP_DecryptInit_ex failed"); 1552e86b9096SDag-Erling Smørgrav return -1; 1553e86b9096SDag-Erling Smørgrav } 1554e86b9096SDag-Erling Smørgrav 1555e86b9096SDag-Erling Smørgrav return (key == ticket_keys) ? 1 : 2; 1556e86b9096SDag-Erling Smørgrav } 1557e86b9096SDag-Erling Smørgrav return -1; 1558e86b9096SDag-Erling Smørgrav #else 1559e86b9096SDag-Erling Smørgrav (void)key_name; 1560e86b9096SDag-Erling Smørgrav (void)iv; 1561e86b9096SDag-Erling Smørgrav (void)evp_sctx; 1562e86b9096SDag-Erling Smørgrav (void)hmac_ctx; 1563e86b9096SDag-Erling Smørgrav (void)enc; 1564e86b9096SDag-Erling Smørgrav return 0; 1565e86b9096SDag-Erling Smørgrav #endif 1566e86b9096SDag-Erling Smørgrav } 156725039b37SCy Schubert #endif /* HAVE_SSL */ 1568e86b9096SDag-Erling Smørgrav 1569e86b9096SDag-Erling Smørgrav void 1570e86b9096SDag-Erling Smørgrav listen_sslctx_delete_ticket_keys(void) 1571e86b9096SDag-Erling Smørgrav { 1572e86b9096SDag-Erling Smørgrav struct tls_session_ticket_key *key; 1573e86b9096SDag-Erling Smørgrav if(!ticket_keys) return; 1574e86b9096SDag-Erling Smørgrav for(key = ticket_keys; key->key_name != NULL; key++) { 1575e86b9096SDag-Erling Smørgrav /* wipe key data from memory*/ 1576e86b9096SDag-Erling Smørgrav #ifdef HAVE_EXPLICIT_BZERO 1577e86b9096SDag-Erling Smørgrav explicit_bzero(key->key_name, 80); 1578e86b9096SDag-Erling Smørgrav #else 1579e86b9096SDag-Erling Smørgrav memset(key->key_name, 0xdd, 80); 1580e86b9096SDag-Erling Smørgrav #endif 1581e86b9096SDag-Erling Smørgrav free(key->key_name); 1582e86b9096SDag-Erling Smørgrav } 1583e86b9096SDag-Erling Smørgrav free(ticket_keys); 1584e86b9096SDag-Erling Smørgrav ticket_keys = NULL; 1585e86b9096SDag-Erling Smørgrav } 1586*c0caa2e2SCy Schubert 1587*c0caa2e2SCy Schubert # ifndef USE_WINSOCK 1588*c0caa2e2SCy Schubert char* 1589*c0caa2e2SCy Schubert sock_strerror(int errn) 1590*c0caa2e2SCy Schubert { 1591*c0caa2e2SCy Schubert return strerror(errn); 1592*c0caa2e2SCy Schubert } 1593*c0caa2e2SCy Schubert 1594*c0caa2e2SCy Schubert void 1595*c0caa2e2SCy Schubert sock_close(int socket) 1596*c0caa2e2SCy Schubert { 1597*c0caa2e2SCy Schubert close(socket); 1598*c0caa2e2SCy Schubert } 1599*c0caa2e2SCy Schubert 1600*c0caa2e2SCy Schubert # else 1601*c0caa2e2SCy Schubert char* 1602*c0caa2e2SCy Schubert sock_strerror(int ATTR_UNUSED(errn)) 1603*c0caa2e2SCy Schubert { 1604*c0caa2e2SCy Schubert return wsa_strerror(WSAGetLastError()); 1605*c0caa2e2SCy Schubert } 1606*c0caa2e2SCy Schubert 1607*c0caa2e2SCy Schubert void 1608*c0caa2e2SCy Schubert sock_close(int socket) 1609*c0caa2e2SCy Schubert { 1610*c0caa2e2SCy Schubert closesocket(socket); 1611*c0caa2e2SCy Schubert } 1612*c0caa2e2SCy Schubert 1613*c0caa2e2SCy Schubert # endif /* USE_WINSOCK */ 1614