xref: /freebsd/contrib/unbound/util/net_help.c (revision c0caa2e24e9a8c64aa01e4265e8b989ba74b9702)
1b7579f77SDag-Erling Smørgrav /*
2b7579f77SDag-Erling Smørgrav  * util/net_help.c - implementation of the network helper code
3b7579f77SDag-Erling Smørgrav  *
4b7579f77SDag-Erling Smørgrav  * Copyright (c) 2007, NLnet Labs. All rights reserved.
5b7579f77SDag-Erling Smørgrav  *
6b7579f77SDag-Erling Smørgrav  * This software is open source.
7b7579f77SDag-Erling Smørgrav  *
8b7579f77SDag-Erling Smørgrav  * Redistribution and use in source and binary forms, with or without
9b7579f77SDag-Erling Smørgrav  * modification, are permitted provided that the following conditions
10b7579f77SDag-Erling Smørgrav  * are met:
11b7579f77SDag-Erling Smørgrav  *
12b7579f77SDag-Erling Smørgrav  * Redistributions of source code must retain the above copyright notice,
13b7579f77SDag-Erling Smørgrav  * this list of conditions and the following disclaimer.
14b7579f77SDag-Erling Smørgrav  *
15b7579f77SDag-Erling Smørgrav  * Redistributions in binary form must reproduce the above copyright notice,
16b7579f77SDag-Erling Smørgrav  * this list of conditions and the following disclaimer in the documentation
17b7579f77SDag-Erling Smørgrav  * and/or other materials provided with the distribution.
18b7579f77SDag-Erling Smørgrav  *
19b7579f77SDag-Erling Smørgrav  * Neither the name of the NLNET LABS nor the names of its contributors may
20b7579f77SDag-Erling Smørgrav  * be used to endorse or promote products derived from this software without
21b7579f77SDag-Erling Smørgrav  * specific prior written permission.
22b7579f77SDag-Erling Smørgrav  *
23b7579f77SDag-Erling Smørgrav  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
2417d15b25SDag-Erling Smørgrav  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
2517d15b25SDag-Erling Smørgrav  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
2617d15b25SDag-Erling Smørgrav  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
2717d15b25SDag-Erling Smørgrav  * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
2817d15b25SDag-Erling Smørgrav  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
2917d15b25SDag-Erling Smørgrav  * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
3017d15b25SDag-Erling Smørgrav  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
3117d15b25SDag-Erling Smørgrav  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
3217d15b25SDag-Erling Smørgrav  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
3317d15b25SDag-Erling Smørgrav  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34b7579f77SDag-Erling Smørgrav  */
35b7579f77SDag-Erling Smørgrav /**
36b7579f77SDag-Erling Smørgrav  * \file
37b7579f77SDag-Erling Smørgrav  * Implementation of net_help.h.
38b7579f77SDag-Erling Smørgrav  */
39b7579f77SDag-Erling Smørgrav 
40b7579f77SDag-Erling Smørgrav #include "config.h"
41b7579f77SDag-Erling Smørgrav #include "util/net_help.h"
42b7579f77SDag-Erling Smørgrav #include "util/log.h"
43b7579f77SDag-Erling Smørgrav #include "util/data/dname.h"
44b7579f77SDag-Erling Smørgrav #include "util/module.h"
45b7579f77SDag-Erling Smørgrav #include "util/regional.h"
46e86b9096SDag-Erling Smørgrav #include "util/config_file.h"
4709a3aaf3SDag-Erling Smørgrav #include "sldns/parseutil.h"
4809a3aaf3SDag-Erling Smørgrav #include "sldns/wire2str.h"
49b7579f77SDag-Erling Smørgrav #include <fcntl.h>
508ed2b524SDag-Erling Smørgrav #ifdef HAVE_OPENSSL_SSL_H
51b7579f77SDag-Erling Smørgrav #include <openssl/ssl.h>
52e86b9096SDag-Erling Smørgrav #include <openssl/evp.h>
53e86b9096SDag-Erling Smørgrav #include <openssl/rand.h>
548ed2b524SDag-Erling Smørgrav #endif
558ed2b524SDag-Erling Smørgrav #ifdef HAVE_OPENSSL_ERR_H
56b7579f77SDag-Erling Smørgrav #include <openssl/err.h>
578ed2b524SDag-Erling Smørgrav #endif
5825039b37SCy Schubert #ifdef HAVE_OPENSSL_CORE_NAMES_H
5925039b37SCy Schubert #include <openssl/core_names.h>
6025039b37SCy Schubert #endif
613bd4df0aSDag-Erling Smørgrav #ifdef USE_WINSOCK
623bd4df0aSDag-Erling Smørgrav #include <wincrypt.h>
633bd4df0aSDag-Erling Smørgrav #endif
64*c0caa2e2SCy Schubert #ifdef HAVE_NGHTTP2_NGHTTP2_H
65*c0caa2e2SCy Schubert #include <nghttp2/nghttp2.h>
66*c0caa2e2SCy Schubert #endif
67b7579f77SDag-Erling Smørgrav 
68b7579f77SDag-Erling Smørgrav /** max length of an IP address (the address portion) that we allow */
69b7579f77SDag-Erling Smørgrav #define MAX_ADDR_STRLEN 128 /* characters */
70b7579f77SDag-Erling Smørgrav /** default value for EDNS ADVERTISED size */
71b7579f77SDag-Erling Smørgrav uint16_t EDNS_ADVERTISED_SIZE = 4096;
72b7579f77SDag-Erling Smørgrav 
73b7579f77SDag-Erling Smørgrav /** minimal responses when positive answer: default is no */
74b7579f77SDag-Erling Smørgrav int MINIMAL_RESPONSES = 0;
75b7579f77SDag-Erling Smørgrav 
7625039b37SCy Schubert /** rrset order roundrobin: default is yes */
7725039b37SCy Schubert int RRSET_ROUNDROBIN = 1;
78b7579f77SDag-Erling Smørgrav 
79e86b9096SDag-Erling Smørgrav /** log tag queries with name instead of 'info' for filtering */
80e86b9096SDag-Erling Smørgrav int LOG_TAG_QUERYREPLY = 0;
81e86b9096SDag-Erling Smørgrav 
82e86b9096SDag-Erling Smørgrav static struct tls_session_ticket_key {
83e86b9096SDag-Erling Smørgrav 	unsigned char *key_name;
84e86b9096SDag-Erling Smørgrav 	unsigned char *aes_key;
85e86b9096SDag-Erling Smørgrav 	unsigned char *hmac_key;
86e86b9096SDag-Erling Smørgrav } *ticket_keys;
87e86b9096SDag-Erling Smørgrav 
88*c0caa2e2SCy Schubert #ifdef HAVE_SSL
8925039b37SCy Schubert /**
9025039b37SCy Schubert  * callback TLS session ticket encrypt and decrypt
9125039b37SCy Schubert  * For use with SSL_CTX_set_tlsext_ticket_key_cb or
9225039b37SCy Schubert  * SSL_CTX_set_tlsext_ticket_key_evp_cb
9325039b37SCy Schubert  * @param s: the SSL_CTX to use (from connect_sslctx_create())
9425039b37SCy Schubert  * @param key_name: secret name, 16 bytes
9525039b37SCy Schubert  * @param iv: up to EVP_MAX_IV_LENGTH.
9625039b37SCy Schubert  * @param evp_ctx: the evp cipher context, function sets this.
9725039b37SCy Schubert  * @param hmac_ctx: the hmac context, function sets this.
9825039b37SCy Schubert  * 	with ..key_cb it is of type HMAC_CTX*
9925039b37SCy Schubert  * 	with ..key_evp_cb it is of type EVP_MAC_CTX*
10025039b37SCy Schubert  * @param enc: 1 is encrypt, 0 is decrypt
10125039b37SCy Schubert  * @return 0 on no ticket, 1 for okay, and 2 for okay but renew the ticket
10225039b37SCy Schubert  * 	(the ticket is decrypt only). and <0 for failures.
10325039b37SCy Schubert  */
10425039b37SCy Schubert int tls_session_ticket_key_cb(SSL *s, unsigned char* key_name,
10525039b37SCy Schubert 	unsigned char* iv, EVP_CIPHER_CTX *evp_ctx,
10625039b37SCy Schubert #ifdef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB
10725039b37SCy Schubert 	EVP_MAC_CTX *hmac_ctx,
10825039b37SCy Schubert #else
10925039b37SCy Schubert 	HMAC_CTX* hmac_ctx,
11025039b37SCy Schubert #endif
11125039b37SCy Schubert 	int enc);
11225039b37SCy Schubert #endif /* HAVE_SSL */
11325039b37SCy Schubert 
114b7579f77SDag-Erling Smørgrav /* returns true is string addr is an ip6 specced address */
115b7579f77SDag-Erling Smørgrav int
116b7579f77SDag-Erling Smørgrav str_is_ip6(const char* str)
117b7579f77SDag-Erling Smørgrav {
118b7579f77SDag-Erling Smørgrav 	if(strchr(str, ':'))
119b7579f77SDag-Erling Smørgrav 		return 1;
120b7579f77SDag-Erling Smørgrav 	else    return 0;
121b7579f77SDag-Erling Smørgrav }
122b7579f77SDag-Erling Smørgrav 
123b7579f77SDag-Erling Smørgrav int
124b7579f77SDag-Erling Smørgrav fd_set_nonblock(int s)
125b7579f77SDag-Erling Smørgrav {
126b7579f77SDag-Erling Smørgrav #ifdef HAVE_FCNTL
127b7579f77SDag-Erling Smørgrav 	int flag;
128b7579f77SDag-Erling Smørgrav 	if((flag = fcntl(s, F_GETFL)) == -1) {
129b7579f77SDag-Erling Smørgrav 		log_err("can't fcntl F_GETFL: %s", strerror(errno));
130b7579f77SDag-Erling Smørgrav 		flag = 0;
131b7579f77SDag-Erling Smørgrav 	}
132b7579f77SDag-Erling Smørgrav 	flag |= O_NONBLOCK;
133b7579f77SDag-Erling Smørgrav 	if(fcntl(s, F_SETFL, flag) == -1) {
134b7579f77SDag-Erling Smørgrav 		log_err("can't fcntl F_SETFL: %s", strerror(errno));
135b7579f77SDag-Erling Smørgrav 		return 0;
136b7579f77SDag-Erling Smørgrav 	}
137b7579f77SDag-Erling Smørgrav #elif defined(HAVE_IOCTLSOCKET)
138b7579f77SDag-Erling Smørgrav 	unsigned long on = 1;
139b7579f77SDag-Erling Smørgrav 	if(ioctlsocket(s, FIONBIO, &on) != 0) {
140b7579f77SDag-Erling Smørgrav 		log_err("can't ioctlsocket FIONBIO on: %s",
141b7579f77SDag-Erling Smørgrav 			wsa_strerror(WSAGetLastError()));
142b7579f77SDag-Erling Smørgrav 	}
143b7579f77SDag-Erling Smørgrav #endif
144b7579f77SDag-Erling Smørgrav 	return 1;
145b7579f77SDag-Erling Smørgrav }
146b7579f77SDag-Erling Smørgrav 
147b7579f77SDag-Erling Smørgrav int
148b7579f77SDag-Erling Smørgrav fd_set_block(int s)
149b7579f77SDag-Erling Smørgrav {
150b7579f77SDag-Erling Smørgrav #ifdef HAVE_FCNTL
151b7579f77SDag-Erling Smørgrav 	int flag;
152b7579f77SDag-Erling Smørgrav 	if((flag = fcntl(s, F_GETFL)) == -1) {
153b7579f77SDag-Erling Smørgrav 		log_err("cannot fcntl F_GETFL: %s", strerror(errno));
154b7579f77SDag-Erling Smørgrav 		flag = 0;
155b7579f77SDag-Erling Smørgrav 	}
156b7579f77SDag-Erling Smørgrav 	flag &= ~O_NONBLOCK;
157b7579f77SDag-Erling Smørgrav 	if(fcntl(s, F_SETFL, flag) == -1) {
158b7579f77SDag-Erling Smørgrav 		log_err("cannot fcntl F_SETFL: %s", strerror(errno));
159b7579f77SDag-Erling Smørgrav 		return 0;
160b7579f77SDag-Erling Smørgrav 	}
161b7579f77SDag-Erling Smørgrav #elif defined(HAVE_IOCTLSOCKET)
162b7579f77SDag-Erling Smørgrav 	unsigned long off = 0;
163b7579f77SDag-Erling Smørgrav 	if(ioctlsocket(s, FIONBIO, &off) != 0) {
164971980c3SDag-Erling Smørgrav 		if(WSAGetLastError() != WSAEINVAL || verbosity >= 4)
165b7579f77SDag-Erling Smørgrav 			log_err("can't ioctlsocket FIONBIO off: %s",
166b7579f77SDag-Erling Smørgrav 				wsa_strerror(WSAGetLastError()));
167b7579f77SDag-Erling Smørgrav 	}
168b7579f77SDag-Erling Smørgrav #endif
169b7579f77SDag-Erling Smørgrav 	return 1;
170b7579f77SDag-Erling Smørgrav }
171b7579f77SDag-Erling Smørgrav 
172b7579f77SDag-Erling Smørgrav int
173b7579f77SDag-Erling Smørgrav is_pow2(size_t num)
174b7579f77SDag-Erling Smørgrav {
175b7579f77SDag-Erling Smørgrav 	if(num == 0) return 1;
176b7579f77SDag-Erling Smørgrav 	return (num & (num-1)) == 0;
177b7579f77SDag-Erling Smørgrav }
178b7579f77SDag-Erling Smørgrav 
179b7579f77SDag-Erling Smørgrav void*
180b7579f77SDag-Erling Smørgrav memdup(void* data, size_t len)
181b7579f77SDag-Erling Smørgrav {
182b7579f77SDag-Erling Smørgrav 	void* d;
183b7579f77SDag-Erling Smørgrav 	if(!data) return NULL;
184b7579f77SDag-Erling Smørgrav 	if(len == 0) return NULL;
185b7579f77SDag-Erling Smørgrav 	d = malloc(len);
186b7579f77SDag-Erling Smørgrav 	if(!d) return NULL;
187b7579f77SDag-Erling Smørgrav 	memcpy(d, data, len);
188b7579f77SDag-Erling Smørgrav 	return d;
189b7579f77SDag-Erling Smørgrav }
190b7579f77SDag-Erling Smørgrav 
191b7579f77SDag-Erling Smørgrav void
192b7579f77SDag-Erling Smørgrav log_addr(enum verbosity_value v, const char* str,
193b7579f77SDag-Erling Smørgrav 	struct sockaddr_storage* addr, socklen_t addrlen)
194b7579f77SDag-Erling Smørgrav {
195b7579f77SDag-Erling Smørgrav 	uint16_t port;
196b7579f77SDag-Erling Smørgrav 	const char* family = "unknown";
197b7579f77SDag-Erling Smørgrav 	char dest[100];
198b7579f77SDag-Erling Smørgrav 	int af = (int)((struct sockaddr_in*)addr)->sin_family;
199b7579f77SDag-Erling Smørgrav 	void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr;
200b7579f77SDag-Erling Smørgrav 	if(verbosity < v)
201b7579f77SDag-Erling Smørgrav 		return;
202b7579f77SDag-Erling Smørgrav 	switch(af) {
203b7579f77SDag-Erling Smørgrav 		case AF_INET: family="ip4"; break;
204b7579f77SDag-Erling Smørgrav 		case AF_INET6: family="ip6";
205b7579f77SDag-Erling Smørgrav 			sinaddr = &((struct sockaddr_in6*)addr)->sin6_addr;
206b7579f77SDag-Erling Smørgrav 			break;
2076480faa8SDag-Erling Smørgrav 		case AF_LOCAL:
2086480faa8SDag-Erling Smørgrav 			dest[0]=0;
2096480faa8SDag-Erling Smørgrav 			(void)inet_ntop(af, sinaddr, dest,
2106480faa8SDag-Erling Smørgrav 				(socklen_t)sizeof(dest));
2116480faa8SDag-Erling Smørgrav 			verbose(v, "%s local %s", str, dest);
2126480faa8SDag-Erling Smørgrav 			return; /* do not continue and try to get port */
213b7579f77SDag-Erling Smørgrav 		default: break;
214b7579f77SDag-Erling Smørgrav 	}
215b7579f77SDag-Erling Smørgrav 	if(inet_ntop(af, sinaddr, dest, (socklen_t)sizeof(dest)) == 0) {
21617d15b25SDag-Erling Smørgrav 		(void)strlcpy(dest, "(inet_ntop error)", sizeof(dest));
217b7579f77SDag-Erling Smørgrav 	}
218b7579f77SDag-Erling Smørgrav 	dest[sizeof(dest)-1] = 0;
219b7579f77SDag-Erling Smørgrav 	port = ntohs(((struct sockaddr_in*)addr)->sin_port);
220b7579f77SDag-Erling Smørgrav 	if(verbosity >= 4)
221b7579f77SDag-Erling Smørgrav 		verbose(v, "%s %s %s port %d (len %d)", str, family, dest,
222b7579f77SDag-Erling Smørgrav 			(int)port, (int)addrlen);
223b7579f77SDag-Erling Smørgrav 	else	verbose(v, "%s %s port %d", str, dest, (int)port);
224b7579f77SDag-Erling Smørgrav }
225b7579f77SDag-Erling Smørgrav 
226b7579f77SDag-Erling Smørgrav int
227b7579f77SDag-Erling Smørgrav extstrtoaddr(const char* str, struct sockaddr_storage* addr,
228b7579f77SDag-Erling Smørgrav 	socklen_t* addrlen)
229b7579f77SDag-Erling Smørgrav {
230b7579f77SDag-Erling Smørgrav 	char* s;
231b7579f77SDag-Erling Smørgrav 	int port = UNBOUND_DNS_PORT;
232b7579f77SDag-Erling Smørgrav 	if((s=strchr(str, '@'))) {
233b7579f77SDag-Erling Smørgrav 		char buf[MAX_ADDR_STRLEN];
234b7579f77SDag-Erling Smørgrav 		if(s-str >= MAX_ADDR_STRLEN) {
235b7579f77SDag-Erling Smørgrav 			return 0;
236b7579f77SDag-Erling Smørgrav 		}
23717d15b25SDag-Erling Smørgrav 		(void)strlcpy(buf, str, sizeof(buf));
238b7579f77SDag-Erling Smørgrav 		buf[s-str] = 0;
239b7579f77SDag-Erling Smørgrav 		port = atoi(s+1);
240b7579f77SDag-Erling Smørgrav 		if(port == 0 && strcmp(s+1,"0")!=0) {
241b7579f77SDag-Erling Smørgrav 			return 0;
242b7579f77SDag-Erling Smørgrav 		}
243b7579f77SDag-Erling Smørgrav 		return ipstrtoaddr(buf, port, addr, addrlen);
244b7579f77SDag-Erling Smørgrav 	}
245b7579f77SDag-Erling Smørgrav 	return ipstrtoaddr(str, port, addr, addrlen);
246b7579f77SDag-Erling Smørgrav }
247b7579f77SDag-Erling Smørgrav 
248b7579f77SDag-Erling Smørgrav 
249b7579f77SDag-Erling Smørgrav int
250b7579f77SDag-Erling Smørgrav ipstrtoaddr(const char* ip, int port, struct sockaddr_storage* addr,
251b7579f77SDag-Erling Smørgrav 	socklen_t* addrlen)
252b7579f77SDag-Erling Smørgrav {
253b7579f77SDag-Erling Smørgrav 	uint16_t p;
254b7579f77SDag-Erling Smørgrav 	if(!ip) return 0;
255b7579f77SDag-Erling Smørgrav 	p = (uint16_t) port;
256b7579f77SDag-Erling Smørgrav 	if(str_is_ip6(ip)) {
257b7579f77SDag-Erling Smørgrav 		char buf[MAX_ADDR_STRLEN];
258b7579f77SDag-Erling Smørgrav 		char* s;
259b7579f77SDag-Erling Smørgrav 		struct sockaddr_in6* sa = (struct sockaddr_in6*)addr;
260b7579f77SDag-Erling Smørgrav 		*addrlen = (socklen_t)sizeof(struct sockaddr_in6);
261b7579f77SDag-Erling Smørgrav 		memset(sa, 0, *addrlen);
262b7579f77SDag-Erling Smørgrav 		sa->sin6_family = AF_INET6;
263b7579f77SDag-Erling Smørgrav 		sa->sin6_port = (in_port_t)htons(p);
264b7579f77SDag-Erling Smørgrav 		if((s=strchr(ip, '%'))) { /* ip6%interface, rfc 4007 */
265b7579f77SDag-Erling Smørgrav 			if(s-ip >= MAX_ADDR_STRLEN)
266b7579f77SDag-Erling Smørgrav 				return 0;
26717d15b25SDag-Erling Smørgrav 			(void)strlcpy(buf, ip, sizeof(buf));
268b7579f77SDag-Erling Smørgrav 			buf[s-ip]=0;
269b7579f77SDag-Erling Smørgrav 			sa->sin6_scope_id = (uint32_t)atoi(s+1);
270b7579f77SDag-Erling Smørgrav 			ip = buf;
271b7579f77SDag-Erling Smørgrav 		}
272b7579f77SDag-Erling Smørgrav 		if(inet_pton((int)sa->sin6_family, ip, &sa->sin6_addr) <= 0) {
273b7579f77SDag-Erling Smørgrav 			return 0;
274b7579f77SDag-Erling Smørgrav 		}
275b7579f77SDag-Erling Smørgrav 	} else { /* ip4 */
276b7579f77SDag-Erling Smørgrav 		struct sockaddr_in* sa = (struct sockaddr_in*)addr;
277b7579f77SDag-Erling Smørgrav 		*addrlen = (socklen_t)sizeof(struct sockaddr_in);
278b7579f77SDag-Erling Smørgrav 		memset(sa, 0, *addrlen);
279b7579f77SDag-Erling Smørgrav 		sa->sin_family = AF_INET;
280b7579f77SDag-Erling Smørgrav 		sa->sin_port = (in_port_t)htons(p);
281b7579f77SDag-Erling Smørgrav 		if(inet_pton((int)sa->sin_family, ip, &sa->sin_addr) <= 0) {
282b7579f77SDag-Erling Smørgrav 			return 0;
283b7579f77SDag-Erling Smørgrav 		}
284b7579f77SDag-Erling Smørgrav 	}
285b7579f77SDag-Erling Smørgrav 	return 1;
286b7579f77SDag-Erling Smørgrav }
287b7579f77SDag-Erling Smørgrav 
288b7579f77SDag-Erling Smørgrav int netblockstrtoaddr(const char* str, int port, struct sockaddr_storage* addr,
289b7579f77SDag-Erling Smørgrav         socklen_t* addrlen, int* net)
290b7579f77SDag-Erling Smørgrav {
2910fb34990SDag-Erling Smørgrav 	char buf[64];
2920fb34990SDag-Erling Smørgrav 	char* s;
293b7579f77SDag-Erling Smørgrav 	*net = (str_is_ip6(str)?128:32);
294b7579f77SDag-Erling Smørgrav 	if((s=strchr(str, '/'))) {
295b7579f77SDag-Erling Smørgrav 		if(atoi(s+1) > *net) {
296b7579f77SDag-Erling Smørgrav 			log_err("netblock too large: %s", str);
297b7579f77SDag-Erling Smørgrav 			return 0;
298b7579f77SDag-Erling Smørgrav 		}
299b7579f77SDag-Erling Smørgrav 		*net = atoi(s+1);
300b7579f77SDag-Erling Smørgrav 		if(*net == 0 && strcmp(s+1, "0") != 0) {
301b7579f77SDag-Erling Smørgrav 			log_err("cannot parse netblock: '%s'", str);
302b7579f77SDag-Erling Smørgrav 			return 0;
303b7579f77SDag-Erling Smørgrav 		}
3040fb34990SDag-Erling Smørgrav 		strlcpy(buf, str, sizeof(buf));
3050fb34990SDag-Erling Smørgrav 		s = strchr(buf, '/');
3060fb34990SDag-Erling Smørgrav 		if(s) *s = 0;
3070fb34990SDag-Erling Smørgrav 		s = buf;
308b7579f77SDag-Erling Smørgrav 	}
309b7579f77SDag-Erling Smørgrav 	if(!ipstrtoaddr(s?s:str, port, addr, addrlen)) {
310b7579f77SDag-Erling Smørgrav 		log_err("cannot parse ip address: '%s'", str);
311b7579f77SDag-Erling Smørgrav 		return 0;
312b7579f77SDag-Erling Smørgrav 	}
313b7579f77SDag-Erling Smørgrav 	if(s) {
314b7579f77SDag-Erling Smørgrav 		addr_mask(addr, *addrlen, *net);
315b7579f77SDag-Erling Smørgrav 	}
316b7579f77SDag-Erling Smørgrav 	return 1;
317b7579f77SDag-Erling Smørgrav }
318b7579f77SDag-Erling Smørgrav 
319091e9e46SCy Schubert /* RPZ format address dname to network byte order address */
320091e9e46SCy Schubert static int ipdnametoaddr(uint8_t* dname, size_t dnamelen,
321091e9e46SCy Schubert 	struct sockaddr_storage* addr, socklen_t* addrlen, int* af)
322091e9e46SCy Schubert {
323091e9e46SCy Schubert 	uint8_t* ia;
324091e9e46SCy Schubert 	size_t dnamelabs = dname_count_labels(dname);
325091e9e46SCy Schubert 	uint8_t lablen;
326091e9e46SCy Schubert 	char* e = NULL;
327091e9e46SCy Schubert 	int z = 0;
328091e9e46SCy Schubert 	size_t len = 0;
329091e9e46SCy Schubert 	int i;
330091e9e46SCy Schubert 	*af = AF_INET;
331091e9e46SCy Schubert 
332091e9e46SCy Schubert 	/* need 1 byte for label length */
333091e9e46SCy Schubert 	if(dnamelen < 1)
334091e9e46SCy Schubert 		return 0;
335091e9e46SCy Schubert 
336091e9e46SCy Schubert 	if(dnamelabs > 6 ||
337091e9e46SCy Schubert 		dname_has_label(dname, dnamelen, (uint8_t*)"\002zz")) {
338091e9e46SCy Schubert 		*af = AF_INET6;
339091e9e46SCy Schubert 	}
340091e9e46SCy Schubert 	len = *dname;
341091e9e46SCy Schubert 	lablen = *dname++;
342091e9e46SCy Schubert 	i = (*af == AF_INET) ? 3 : 15;
343091e9e46SCy Schubert 	if(*af == AF_INET6) {
344091e9e46SCy Schubert 		struct sockaddr_in6* sa = (struct sockaddr_in6*)addr;
345091e9e46SCy Schubert 		*addrlen = (socklen_t)sizeof(struct sockaddr_in6);
346091e9e46SCy Schubert 		memset(sa, 0, *addrlen);
347091e9e46SCy Schubert 		sa->sin6_family = AF_INET6;
348091e9e46SCy Schubert 		ia = (uint8_t*)&sa->sin6_addr;
349091e9e46SCy Schubert 	} else { /* ip4 */
350091e9e46SCy Schubert 		struct sockaddr_in* sa = (struct sockaddr_in*)addr;
351091e9e46SCy Schubert 		*addrlen = (socklen_t)sizeof(struct sockaddr_in);
352091e9e46SCy Schubert 		memset(sa, 0, *addrlen);
353091e9e46SCy Schubert 		sa->sin_family = AF_INET;
354091e9e46SCy Schubert 		ia = (uint8_t*)&sa->sin_addr;
355091e9e46SCy Schubert 	}
356091e9e46SCy Schubert 	while(lablen && i >= 0 && len <= dnamelen) {
357091e9e46SCy Schubert 		char buff[LDNS_MAX_LABELLEN+1];
358091e9e46SCy Schubert 		uint16_t chunk; /* big enough to not overflow on IPv6 hextet */
359091e9e46SCy Schubert 		if((*af == AF_INET && (lablen > 3 || dnamelabs > 6)) ||
360091e9e46SCy Schubert 			(*af == AF_INET6 && (lablen > 4 || dnamelabs > 10))) {
361091e9e46SCy Schubert 			return 0;
362091e9e46SCy Schubert 		}
363091e9e46SCy Schubert 		if(memcmp(dname, "zz", 2) == 0 && *af == AF_INET6) {
364091e9e46SCy Schubert 			/* Add one or more 0 labels. Address is initialised at
365091e9e46SCy Schubert 			 * 0, so just skip the zero part. */
366091e9e46SCy Schubert 			int zl = 11 - dnamelabs;
367091e9e46SCy Schubert 			if(z || zl < 0)
368091e9e46SCy Schubert 				return 0;
369091e9e46SCy Schubert 			z = 1;
370091e9e46SCy Schubert 			i -= (zl*2);
371091e9e46SCy Schubert 		} else {
372091e9e46SCy Schubert 			memcpy(buff, dname, lablen);
373091e9e46SCy Schubert 			buff[lablen] = '\0';
374091e9e46SCy Schubert 			chunk = strtol(buff, &e, (*af == AF_INET) ? 10 : 16);
375091e9e46SCy Schubert 			if(!e || *e != '\0' || (*af == AF_INET && chunk > 255))
376091e9e46SCy Schubert 				return 0;
377091e9e46SCy Schubert 			if(*af == AF_INET) {
378091e9e46SCy Schubert 				log_assert(i < 4 && i >= 0);
379091e9e46SCy Schubert 				ia[i] = (uint8_t)chunk;
380091e9e46SCy Schubert 				i--;
381091e9e46SCy Schubert 			} else {
382091e9e46SCy Schubert 				log_assert(i < 16 && i >= 1);
383091e9e46SCy Schubert 				/* ia in network byte order */
384091e9e46SCy Schubert 				ia[i-1] = (uint8_t)(chunk >> 8);
385091e9e46SCy Schubert 				ia[i] = (uint8_t)(chunk & 0x00FF);
386091e9e46SCy Schubert 				i -= 2;
387091e9e46SCy Schubert 			}
388091e9e46SCy Schubert 		}
389091e9e46SCy Schubert 		dname += lablen;
390091e9e46SCy Schubert 		lablen = *dname++;
391091e9e46SCy Schubert 		len += lablen;
392091e9e46SCy Schubert 	}
393091e9e46SCy Schubert 	if(i != -1)
394091e9e46SCy Schubert 		/* input too short */
395091e9e46SCy Schubert 		return 0;
396091e9e46SCy Schubert 	return 1;
397091e9e46SCy Schubert }
398091e9e46SCy Schubert 
399091e9e46SCy Schubert int netblockdnametoaddr(uint8_t* dname, size_t dnamelen,
400091e9e46SCy Schubert 	struct sockaddr_storage* addr, socklen_t* addrlen, int* net, int* af)
401091e9e46SCy Schubert {
402091e9e46SCy Schubert 	char buff[3 /* 3 digit netblock */ + 1];
403091e9e46SCy Schubert 	size_t nlablen;
404091e9e46SCy Schubert 	if(dnamelen < 1 || *dname > 3)
405091e9e46SCy Schubert 		/* netblock invalid */
406091e9e46SCy Schubert 		return 0;
407091e9e46SCy Schubert 	nlablen = *dname;
408091e9e46SCy Schubert 
409091e9e46SCy Schubert 	if(dnamelen < 1 + nlablen)
410091e9e46SCy Schubert 		return 0;
411091e9e46SCy Schubert 
412091e9e46SCy Schubert 	memcpy(buff, dname+1, nlablen);
413091e9e46SCy Schubert 	buff[nlablen] = '\0';
414091e9e46SCy Schubert 	*net = atoi(buff);
415091e9e46SCy Schubert 	if(*net == 0 && strcmp(buff, "0") != 0)
416091e9e46SCy Schubert 		return 0;
417091e9e46SCy Schubert 	dname += nlablen;
418091e9e46SCy Schubert 	dname++;
419091e9e46SCy Schubert 	if(!ipdnametoaddr(dname, dnamelen-1-nlablen, addr, addrlen, af))
420091e9e46SCy Schubert 		return 0;
421091e9e46SCy Schubert 	if((*af == AF_INET6 && *net > 128) || (*af == AF_INET && *net > 32))
422091e9e46SCy Schubert 		return 0;
423091e9e46SCy Schubert 	return 1;
424091e9e46SCy Schubert }
425091e9e46SCy Schubert 
4260fb34990SDag-Erling Smørgrav int authextstrtoaddr(char* str, struct sockaddr_storage* addr,
4270fb34990SDag-Erling Smørgrav 	socklen_t* addrlen, char** auth_name)
4280fb34990SDag-Erling Smørgrav {
4290fb34990SDag-Erling Smørgrav 	char* s;
4300fb34990SDag-Erling Smørgrav 	int port = UNBOUND_DNS_PORT;
4310fb34990SDag-Erling Smørgrav 	if((s=strchr(str, '@'))) {
4320fb34990SDag-Erling Smørgrav 		char buf[MAX_ADDR_STRLEN];
4330fb34990SDag-Erling Smørgrav 		size_t len = (size_t)(s-str);
4340fb34990SDag-Erling Smørgrav 		char* hash = strchr(s+1, '#');
4350fb34990SDag-Erling Smørgrav 		if(hash) {
4360fb34990SDag-Erling Smørgrav 			*auth_name = hash+1;
4370fb34990SDag-Erling Smørgrav 		} else {
4380fb34990SDag-Erling Smørgrav 			*auth_name = NULL;
4390fb34990SDag-Erling Smørgrav 		}
4400fb34990SDag-Erling Smørgrav 		if(len >= MAX_ADDR_STRLEN) {
4410fb34990SDag-Erling Smørgrav 			return 0;
4420fb34990SDag-Erling Smørgrav 		}
4430fb34990SDag-Erling Smørgrav 		(void)strlcpy(buf, str, sizeof(buf));
4440fb34990SDag-Erling Smørgrav 		buf[len] = 0;
4450fb34990SDag-Erling Smørgrav 		port = atoi(s+1);
4460fb34990SDag-Erling Smørgrav 		if(port == 0) {
4470fb34990SDag-Erling Smørgrav 			if(!hash && strcmp(s+1,"0")!=0)
4480fb34990SDag-Erling Smørgrav 				return 0;
4490fb34990SDag-Erling Smørgrav 			if(hash && strncmp(s+1,"0#",2)!=0)
4500fb34990SDag-Erling Smørgrav 				return 0;
4510fb34990SDag-Erling Smørgrav 		}
4520fb34990SDag-Erling Smørgrav 		return ipstrtoaddr(buf, port, addr, addrlen);
4530fb34990SDag-Erling Smørgrav 	}
4540fb34990SDag-Erling Smørgrav 	if((s=strchr(str, '#'))) {
4550fb34990SDag-Erling Smørgrav 		char buf[MAX_ADDR_STRLEN];
4560fb34990SDag-Erling Smørgrav 		size_t len = (size_t)(s-str);
4570fb34990SDag-Erling Smørgrav 		if(len >= MAX_ADDR_STRLEN) {
4580fb34990SDag-Erling Smørgrav 			return 0;
4590fb34990SDag-Erling Smørgrav 		}
4600fb34990SDag-Erling Smørgrav 		(void)strlcpy(buf, str, sizeof(buf));
4610fb34990SDag-Erling Smørgrav 		buf[len] = 0;
4620fb34990SDag-Erling Smørgrav 		port = UNBOUND_DNS_OVER_TLS_PORT;
4630fb34990SDag-Erling Smørgrav 		*auth_name = s+1;
4640fb34990SDag-Erling Smørgrav 		return ipstrtoaddr(buf, port, addr, addrlen);
4650fb34990SDag-Erling Smørgrav 	}
4660fb34990SDag-Erling Smørgrav 	*auth_name = NULL;
4670fb34990SDag-Erling Smørgrav 	return ipstrtoaddr(str, port, addr, addrlen);
4680fb34990SDag-Erling Smørgrav }
4690fb34990SDag-Erling Smørgrav 
47057bddd21SDag-Erling Smørgrav /** store port number into sockaddr structure */
47157bddd21SDag-Erling Smørgrav void
47257bddd21SDag-Erling Smørgrav sockaddr_store_port(struct sockaddr_storage* addr, socklen_t addrlen, int port)
47357bddd21SDag-Erling Smørgrav {
47457bddd21SDag-Erling Smørgrav 	if(addr_is_ip6(addr, addrlen)) {
47557bddd21SDag-Erling Smørgrav 		struct sockaddr_in6* sa = (struct sockaddr_in6*)addr;
47657bddd21SDag-Erling Smørgrav 		sa->sin6_port = (in_port_t)htons((uint16_t)port);
47757bddd21SDag-Erling Smørgrav 	} else {
47857bddd21SDag-Erling Smørgrav 		struct sockaddr_in* sa = (struct sockaddr_in*)addr;
47957bddd21SDag-Erling Smørgrav 		sa->sin_port = (in_port_t)htons((uint16_t)port);
48057bddd21SDag-Erling Smørgrav 	}
48157bddd21SDag-Erling Smørgrav }
48257bddd21SDag-Erling Smørgrav 
483b7579f77SDag-Erling Smørgrav void
484b7579f77SDag-Erling Smørgrav log_nametypeclass(enum verbosity_value v, const char* str, uint8_t* name,
485b7579f77SDag-Erling Smørgrav 	uint16_t type, uint16_t dclass)
486b7579f77SDag-Erling Smørgrav {
487b7579f77SDag-Erling Smørgrav 	char buf[LDNS_MAX_DOMAINLEN+1];
488b7579f77SDag-Erling Smørgrav 	char t[12], c[12];
489b7579f77SDag-Erling Smørgrav 	const char *ts, *cs;
490b7579f77SDag-Erling Smørgrav 	if(verbosity < v)
491b7579f77SDag-Erling Smørgrav 		return;
492b7579f77SDag-Erling Smørgrav 	dname_str(name, buf);
493b7579f77SDag-Erling Smørgrav 	if(type == LDNS_RR_TYPE_TSIG) ts = "TSIG";
494b7579f77SDag-Erling Smørgrav 	else if(type == LDNS_RR_TYPE_IXFR) ts = "IXFR";
495b7579f77SDag-Erling Smørgrav 	else if(type == LDNS_RR_TYPE_AXFR) ts = "AXFR";
496b7579f77SDag-Erling Smørgrav 	else if(type == LDNS_RR_TYPE_MAILB) ts = "MAILB";
497b7579f77SDag-Erling Smørgrav 	else if(type == LDNS_RR_TYPE_MAILA) ts = "MAILA";
498b7579f77SDag-Erling Smørgrav 	else if(type == LDNS_RR_TYPE_ANY) ts = "ANY";
49917d15b25SDag-Erling Smørgrav 	else if(sldns_rr_descript(type) && sldns_rr_descript(type)->_name)
50017d15b25SDag-Erling Smørgrav 		ts = sldns_rr_descript(type)->_name;
501b7579f77SDag-Erling Smørgrav 	else {
502b7579f77SDag-Erling Smørgrav 		snprintf(t, sizeof(t), "TYPE%d", (int)type);
503b7579f77SDag-Erling Smørgrav 		ts = t;
504b7579f77SDag-Erling Smørgrav 	}
50517d15b25SDag-Erling Smørgrav 	if(sldns_lookup_by_id(sldns_rr_classes, (int)dclass) &&
50617d15b25SDag-Erling Smørgrav 		sldns_lookup_by_id(sldns_rr_classes, (int)dclass)->name)
50717d15b25SDag-Erling Smørgrav 		cs = sldns_lookup_by_id(sldns_rr_classes, (int)dclass)->name;
508b7579f77SDag-Erling Smørgrav 	else {
509b7579f77SDag-Erling Smørgrav 		snprintf(c, sizeof(c), "CLASS%d", (int)dclass);
510b7579f77SDag-Erling Smørgrav 		cs = c;
511b7579f77SDag-Erling Smørgrav 	}
512b7579f77SDag-Erling Smørgrav 	log_info("%s %s %s %s", str, buf, ts, cs);
513b7579f77SDag-Erling Smørgrav }
514b7579f77SDag-Erling Smørgrav 
515e86b9096SDag-Erling Smørgrav void
516e86b9096SDag-Erling Smørgrav log_query_in(const char* str, uint8_t* name, uint16_t type, uint16_t dclass)
517e86b9096SDag-Erling Smørgrav {
518e86b9096SDag-Erling Smørgrav 	char buf[LDNS_MAX_DOMAINLEN+1];
519e86b9096SDag-Erling Smørgrav 	char t[12], c[12];
520e86b9096SDag-Erling Smørgrav 	const char *ts, *cs;
521e86b9096SDag-Erling Smørgrav 	dname_str(name, buf);
522e86b9096SDag-Erling Smørgrav 	if(type == LDNS_RR_TYPE_TSIG) ts = "TSIG";
523e86b9096SDag-Erling Smørgrav 	else if(type == LDNS_RR_TYPE_IXFR) ts = "IXFR";
524e86b9096SDag-Erling Smørgrav 	else if(type == LDNS_RR_TYPE_AXFR) ts = "AXFR";
525e86b9096SDag-Erling Smørgrav 	else if(type == LDNS_RR_TYPE_MAILB) ts = "MAILB";
526e86b9096SDag-Erling Smørgrav 	else if(type == LDNS_RR_TYPE_MAILA) ts = "MAILA";
527e86b9096SDag-Erling Smørgrav 	else if(type == LDNS_RR_TYPE_ANY) ts = "ANY";
528e86b9096SDag-Erling Smørgrav 	else if(sldns_rr_descript(type) && sldns_rr_descript(type)->_name)
529e86b9096SDag-Erling Smørgrav 		ts = sldns_rr_descript(type)->_name;
530e86b9096SDag-Erling Smørgrav 	else {
531e86b9096SDag-Erling Smørgrav 		snprintf(t, sizeof(t), "TYPE%d", (int)type);
532e86b9096SDag-Erling Smørgrav 		ts = t;
533e86b9096SDag-Erling Smørgrav 	}
534e86b9096SDag-Erling Smørgrav 	if(sldns_lookup_by_id(sldns_rr_classes, (int)dclass) &&
535e86b9096SDag-Erling Smørgrav 		sldns_lookup_by_id(sldns_rr_classes, (int)dclass)->name)
536e86b9096SDag-Erling Smørgrav 		cs = sldns_lookup_by_id(sldns_rr_classes, (int)dclass)->name;
537e86b9096SDag-Erling Smørgrav 	else {
538e86b9096SDag-Erling Smørgrav 		snprintf(c, sizeof(c), "CLASS%d", (int)dclass);
539e86b9096SDag-Erling Smørgrav 		cs = c;
540e86b9096SDag-Erling Smørgrav 	}
541e86b9096SDag-Erling Smørgrav 	if(LOG_TAG_QUERYREPLY)
542e86b9096SDag-Erling Smørgrav 		log_query("%s %s %s %s", str, buf, ts, cs);
543e86b9096SDag-Erling Smørgrav 	else	log_info("%s %s %s %s", str, buf, ts, cs);
544e86b9096SDag-Erling Smørgrav }
545e86b9096SDag-Erling Smørgrav 
546b7579f77SDag-Erling Smørgrav void log_name_addr(enum verbosity_value v, const char* str, uint8_t* zone,
547b7579f77SDag-Erling Smørgrav 	struct sockaddr_storage* addr, socklen_t addrlen)
548b7579f77SDag-Erling Smørgrav {
549b7579f77SDag-Erling Smørgrav 	uint16_t port;
550b7579f77SDag-Erling Smørgrav 	const char* family = "unknown_family ";
551b7579f77SDag-Erling Smørgrav 	char namebuf[LDNS_MAX_DOMAINLEN+1];
552b7579f77SDag-Erling Smørgrav 	char dest[100];
553b7579f77SDag-Erling Smørgrav 	int af = (int)((struct sockaddr_in*)addr)->sin_family;
554b7579f77SDag-Erling Smørgrav 	void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr;
555b7579f77SDag-Erling Smørgrav 	if(verbosity < v)
556b7579f77SDag-Erling Smørgrav 		return;
557b7579f77SDag-Erling Smørgrav 	switch(af) {
558b7579f77SDag-Erling Smørgrav 		case AF_INET: family=""; break;
559b7579f77SDag-Erling Smørgrav 		case AF_INET6: family="";
560b7579f77SDag-Erling Smørgrav 			sinaddr = &((struct sockaddr_in6*)addr)->sin6_addr;
561b7579f77SDag-Erling Smørgrav 			break;
56231099b50SDag-Erling Smørgrav 		case AF_LOCAL: family="local "; break;
563b7579f77SDag-Erling Smørgrav 		default: break;
564b7579f77SDag-Erling Smørgrav 	}
565b7579f77SDag-Erling Smørgrav 	if(inet_ntop(af, sinaddr, dest, (socklen_t)sizeof(dest)) == 0) {
56617d15b25SDag-Erling Smørgrav 		(void)strlcpy(dest, "(inet_ntop error)", sizeof(dest));
567b7579f77SDag-Erling Smørgrav 	}
568b7579f77SDag-Erling Smørgrav 	dest[sizeof(dest)-1] = 0;
569b7579f77SDag-Erling Smørgrav 	port = ntohs(((struct sockaddr_in*)addr)->sin_port);
570b7579f77SDag-Erling Smørgrav 	dname_str(zone, namebuf);
571b7579f77SDag-Erling Smørgrav 	if(af != AF_INET && af != AF_INET6)
572b7579f77SDag-Erling Smørgrav 		verbose(v, "%s <%s> %s%s#%d (addrlen %d)",
573b7579f77SDag-Erling Smørgrav 			str, namebuf, family, dest, (int)port, (int)addrlen);
574b7579f77SDag-Erling Smørgrav 	else	verbose(v, "%s <%s> %s%s#%d",
575b7579f77SDag-Erling Smørgrav 			str, namebuf, family, dest, (int)port);
576b7579f77SDag-Erling Smørgrav }
577b7579f77SDag-Erling Smørgrav 
578ff825849SDag-Erling Smørgrav void log_err_addr(const char* str, const char* err,
579ff825849SDag-Erling Smørgrav 	struct sockaddr_storage* addr, socklen_t addrlen)
580ff825849SDag-Erling Smørgrav {
581ff825849SDag-Erling Smørgrav 	uint16_t port;
582ff825849SDag-Erling Smørgrav 	char dest[100];
583ff825849SDag-Erling Smørgrav 	int af = (int)((struct sockaddr_in*)addr)->sin_family;
584ff825849SDag-Erling Smørgrav 	void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr;
585ff825849SDag-Erling Smørgrav 	if(af == AF_INET6)
586ff825849SDag-Erling Smørgrav 		sinaddr = &((struct sockaddr_in6*)addr)->sin6_addr;
587ff825849SDag-Erling Smørgrav 	if(inet_ntop(af, sinaddr, dest, (socklen_t)sizeof(dest)) == 0) {
588ff825849SDag-Erling Smørgrav 		(void)strlcpy(dest, "(inet_ntop error)", sizeof(dest));
589ff825849SDag-Erling Smørgrav 	}
590ff825849SDag-Erling Smørgrav 	dest[sizeof(dest)-1] = 0;
591ff825849SDag-Erling Smørgrav 	port = ntohs(((struct sockaddr_in*)addr)->sin_port);
592ff825849SDag-Erling Smørgrav 	if(verbosity >= 4)
593ff825849SDag-Erling Smørgrav 		log_err("%s: %s for %s port %d (len %d)", str, err, dest,
594ff825849SDag-Erling Smørgrav 			(int)port, (int)addrlen);
5954c75e3aaSDag-Erling Smørgrav 	else	log_err("%s: %s for %s port %d", str, err, dest, (int)port);
596ff825849SDag-Erling Smørgrav }
597ff825849SDag-Erling Smørgrav 
598b7579f77SDag-Erling Smørgrav int
599b7579f77SDag-Erling Smørgrav sockaddr_cmp(struct sockaddr_storage* addr1, socklen_t len1,
600b7579f77SDag-Erling Smørgrav 	struct sockaddr_storage* addr2, socklen_t len2)
601b7579f77SDag-Erling Smørgrav {
602b7579f77SDag-Erling Smørgrav 	struct sockaddr_in* p1_in = (struct sockaddr_in*)addr1;
603b7579f77SDag-Erling Smørgrav 	struct sockaddr_in* p2_in = (struct sockaddr_in*)addr2;
604b7579f77SDag-Erling Smørgrav 	struct sockaddr_in6* p1_in6 = (struct sockaddr_in6*)addr1;
605b7579f77SDag-Erling Smørgrav 	struct sockaddr_in6* p2_in6 = (struct sockaddr_in6*)addr2;
606b7579f77SDag-Erling Smørgrav 	if(len1 < len2)
607b7579f77SDag-Erling Smørgrav 		return -1;
608b7579f77SDag-Erling Smørgrav 	if(len1 > len2)
609b7579f77SDag-Erling Smørgrav 		return 1;
610b7579f77SDag-Erling Smørgrav 	log_assert(len1 == len2);
611b7579f77SDag-Erling Smørgrav 	if( p1_in->sin_family < p2_in->sin_family)
612b7579f77SDag-Erling Smørgrav 		return -1;
613b7579f77SDag-Erling Smørgrav 	if( p1_in->sin_family > p2_in->sin_family)
614b7579f77SDag-Erling Smørgrav 		return 1;
615b7579f77SDag-Erling Smørgrav 	log_assert( p1_in->sin_family == p2_in->sin_family );
616b7579f77SDag-Erling Smørgrav 	/* compare ip4 */
617b7579f77SDag-Erling Smørgrav 	if( p1_in->sin_family == AF_INET ) {
618b7579f77SDag-Erling Smørgrav 		/* just order it, ntohs not required */
619b7579f77SDag-Erling Smørgrav 		if(p1_in->sin_port < p2_in->sin_port)
620b7579f77SDag-Erling Smørgrav 			return -1;
621b7579f77SDag-Erling Smørgrav 		if(p1_in->sin_port > p2_in->sin_port)
622b7579f77SDag-Erling Smørgrav 			return 1;
623b7579f77SDag-Erling Smørgrav 		log_assert(p1_in->sin_port == p2_in->sin_port);
624b7579f77SDag-Erling Smørgrav 		return memcmp(&p1_in->sin_addr, &p2_in->sin_addr, INET_SIZE);
625b7579f77SDag-Erling Smørgrav 	} else if (p1_in6->sin6_family == AF_INET6) {
626b7579f77SDag-Erling Smørgrav 		/* just order it, ntohs not required */
627b7579f77SDag-Erling Smørgrav 		if(p1_in6->sin6_port < p2_in6->sin6_port)
628b7579f77SDag-Erling Smørgrav 			return -1;
629b7579f77SDag-Erling Smørgrav 		if(p1_in6->sin6_port > p2_in6->sin6_port)
630b7579f77SDag-Erling Smørgrav 			return 1;
631b7579f77SDag-Erling Smørgrav 		log_assert(p1_in6->sin6_port == p2_in6->sin6_port);
632b7579f77SDag-Erling Smørgrav 		return memcmp(&p1_in6->sin6_addr, &p2_in6->sin6_addr,
633b7579f77SDag-Erling Smørgrav 			INET6_SIZE);
634b7579f77SDag-Erling Smørgrav 	} else {
635b7579f77SDag-Erling Smørgrav 		/* eek unknown type, perform this comparison for sanity. */
636b7579f77SDag-Erling Smørgrav 		return memcmp(addr1, addr2, len1);
637b7579f77SDag-Erling Smørgrav 	}
638b7579f77SDag-Erling Smørgrav }
639b7579f77SDag-Erling Smørgrav 
640b7579f77SDag-Erling Smørgrav int
641b7579f77SDag-Erling Smørgrav sockaddr_cmp_addr(struct sockaddr_storage* addr1, socklen_t len1,
642b7579f77SDag-Erling Smørgrav 	struct sockaddr_storage* addr2, socklen_t len2)
643b7579f77SDag-Erling Smørgrav {
644b7579f77SDag-Erling Smørgrav 	struct sockaddr_in* p1_in = (struct sockaddr_in*)addr1;
645b7579f77SDag-Erling Smørgrav 	struct sockaddr_in* p2_in = (struct sockaddr_in*)addr2;
646b7579f77SDag-Erling Smørgrav 	struct sockaddr_in6* p1_in6 = (struct sockaddr_in6*)addr1;
647b7579f77SDag-Erling Smørgrav 	struct sockaddr_in6* p2_in6 = (struct sockaddr_in6*)addr2;
648b7579f77SDag-Erling Smørgrav 	if(len1 < len2)
649b7579f77SDag-Erling Smørgrav 		return -1;
650b7579f77SDag-Erling Smørgrav 	if(len1 > len2)
651b7579f77SDag-Erling Smørgrav 		return 1;
652b7579f77SDag-Erling Smørgrav 	log_assert(len1 == len2);
653b7579f77SDag-Erling Smørgrav 	if( p1_in->sin_family < p2_in->sin_family)
654b7579f77SDag-Erling Smørgrav 		return -1;
655b7579f77SDag-Erling Smørgrav 	if( p1_in->sin_family > p2_in->sin_family)
656b7579f77SDag-Erling Smørgrav 		return 1;
657b7579f77SDag-Erling Smørgrav 	log_assert( p1_in->sin_family == p2_in->sin_family );
658b7579f77SDag-Erling Smørgrav 	/* compare ip4 */
659b7579f77SDag-Erling Smørgrav 	if( p1_in->sin_family == AF_INET ) {
660b7579f77SDag-Erling Smørgrav 		return memcmp(&p1_in->sin_addr, &p2_in->sin_addr, INET_SIZE);
661b7579f77SDag-Erling Smørgrav 	} else if (p1_in6->sin6_family == AF_INET6) {
662b7579f77SDag-Erling Smørgrav 		return memcmp(&p1_in6->sin6_addr, &p2_in6->sin6_addr,
663b7579f77SDag-Erling Smørgrav 			INET6_SIZE);
664b7579f77SDag-Erling Smørgrav 	} else {
665b7579f77SDag-Erling Smørgrav 		/* eek unknown type, perform this comparison for sanity. */
666b7579f77SDag-Erling Smørgrav 		return memcmp(addr1, addr2, len1);
667b7579f77SDag-Erling Smørgrav 	}
668b7579f77SDag-Erling Smørgrav }
669b7579f77SDag-Erling Smørgrav 
670b7579f77SDag-Erling Smørgrav int
671b7579f77SDag-Erling Smørgrav addr_is_ip6(struct sockaddr_storage* addr, socklen_t len)
672b7579f77SDag-Erling Smørgrav {
673b7579f77SDag-Erling Smørgrav 	if(len == (socklen_t)sizeof(struct sockaddr_in6) &&
674b7579f77SDag-Erling Smørgrav 		((struct sockaddr_in6*)addr)->sin6_family == AF_INET6)
675b7579f77SDag-Erling Smørgrav 		return 1;
676b7579f77SDag-Erling Smørgrav 	else    return 0;
677b7579f77SDag-Erling Smørgrav }
678b7579f77SDag-Erling Smørgrav 
679b7579f77SDag-Erling Smørgrav void
680b7579f77SDag-Erling Smørgrav addr_mask(struct sockaddr_storage* addr, socklen_t len, int net)
681b7579f77SDag-Erling Smørgrav {
682b7579f77SDag-Erling Smørgrav 	uint8_t mask[8] = {0x0, 0x80, 0xc0, 0xe0, 0xf0, 0xf8, 0xfc, 0xfe};
683b7579f77SDag-Erling Smørgrav 	int i, max;
684b7579f77SDag-Erling Smørgrav 	uint8_t* s;
685b7579f77SDag-Erling Smørgrav 	if(addr_is_ip6(addr, len)) {
686b7579f77SDag-Erling Smørgrav 		s = (uint8_t*)&((struct sockaddr_in6*)addr)->sin6_addr;
687b7579f77SDag-Erling Smørgrav 		max = 128;
688b7579f77SDag-Erling Smørgrav 	} else {
689b7579f77SDag-Erling Smørgrav 		s = (uint8_t*)&((struct sockaddr_in*)addr)->sin_addr;
690b7579f77SDag-Erling Smørgrav 		max = 32;
691b7579f77SDag-Erling Smørgrav 	}
692b7579f77SDag-Erling Smørgrav 	if(net >= max)
693b7579f77SDag-Erling Smørgrav 		return;
694b7579f77SDag-Erling Smørgrav 	for(i=net/8+1; i<max/8; i++) {
695b7579f77SDag-Erling Smørgrav 		s[i] = 0;
696b7579f77SDag-Erling Smørgrav 	}
697b7579f77SDag-Erling Smørgrav 	s[net/8] &= mask[net&0x7];
698b7579f77SDag-Erling Smørgrav }
699b7579f77SDag-Erling Smørgrav 
700b7579f77SDag-Erling Smørgrav int
701b7579f77SDag-Erling Smørgrav addr_in_common(struct sockaddr_storage* addr1, int net1,
702b7579f77SDag-Erling Smørgrav 	struct sockaddr_storage* addr2, int net2, socklen_t addrlen)
703b7579f77SDag-Erling Smørgrav {
704b7579f77SDag-Erling Smørgrav 	int min = (net1<net2)?net1:net2;
705b7579f77SDag-Erling Smørgrav 	int i, to;
706b7579f77SDag-Erling Smørgrav 	int match = 0;
707b7579f77SDag-Erling Smørgrav 	uint8_t* s1, *s2;
708b7579f77SDag-Erling Smørgrav 	if(addr_is_ip6(addr1, addrlen)) {
709b7579f77SDag-Erling Smørgrav 		s1 = (uint8_t*)&((struct sockaddr_in6*)addr1)->sin6_addr;
710b7579f77SDag-Erling Smørgrav 		s2 = (uint8_t*)&((struct sockaddr_in6*)addr2)->sin6_addr;
711b7579f77SDag-Erling Smørgrav 		to = 16;
712b7579f77SDag-Erling Smørgrav 	} else {
713b7579f77SDag-Erling Smørgrav 		s1 = (uint8_t*)&((struct sockaddr_in*)addr1)->sin_addr;
714b7579f77SDag-Erling Smørgrav 		s2 = (uint8_t*)&((struct sockaddr_in*)addr2)->sin_addr;
715b7579f77SDag-Erling Smørgrav 		to = 4;
716b7579f77SDag-Erling Smørgrav 	}
717b7579f77SDag-Erling Smørgrav 	/* match = bits_in_common(s1, s2, to); */
718b7579f77SDag-Erling Smørgrav 	for(i=0; i<to; i++) {
719b7579f77SDag-Erling Smørgrav 		if(s1[i] == s2[i]) {
720b7579f77SDag-Erling Smørgrav 			match += 8;
721b7579f77SDag-Erling Smørgrav 		} else {
722b7579f77SDag-Erling Smørgrav 			uint8_t z = s1[i]^s2[i];
723b7579f77SDag-Erling Smørgrav 			log_assert(z);
724b7579f77SDag-Erling Smørgrav 			while(!(z&0x80)) {
725b7579f77SDag-Erling Smørgrav 				match++;
726b7579f77SDag-Erling Smørgrav 				z<<=1;
727b7579f77SDag-Erling Smørgrav 			}
728b7579f77SDag-Erling Smørgrav 			break;
729b7579f77SDag-Erling Smørgrav 		}
730b7579f77SDag-Erling Smørgrav 	}
731b7579f77SDag-Erling Smørgrav 	if(match > min) match = min;
732b7579f77SDag-Erling Smørgrav 	return match;
733b7579f77SDag-Erling Smørgrav }
734b7579f77SDag-Erling Smørgrav 
735b7579f77SDag-Erling Smørgrav void
736b7579f77SDag-Erling Smørgrav addr_to_str(struct sockaddr_storage* addr, socklen_t addrlen,
737b7579f77SDag-Erling Smørgrav 	char* buf, size_t len)
738b7579f77SDag-Erling Smørgrav {
739b7579f77SDag-Erling Smørgrav 	int af = (int)((struct sockaddr_in*)addr)->sin_family;
740b7579f77SDag-Erling Smørgrav 	void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr;
741b7579f77SDag-Erling Smørgrav 	if(addr_is_ip6(addr, addrlen))
742b7579f77SDag-Erling Smørgrav 		sinaddr = &((struct sockaddr_in6*)addr)->sin6_addr;
743b7579f77SDag-Erling Smørgrav 	if(inet_ntop(af, sinaddr, buf, (socklen_t)len) == 0) {
744b7579f77SDag-Erling Smørgrav 		snprintf(buf, len, "(inet_ntop_error)");
745b7579f77SDag-Erling Smørgrav 	}
746b7579f77SDag-Erling Smørgrav }
747b7579f77SDag-Erling Smørgrav 
748b7579f77SDag-Erling Smørgrav int
749b7579f77SDag-Erling Smørgrav addr_is_ip4mapped(struct sockaddr_storage* addr, socklen_t addrlen)
750b7579f77SDag-Erling Smørgrav {
751b7579f77SDag-Erling Smørgrav 	/* prefix for ipv4 into ipv6 mapping is ::ffff:x.x.x.x */
752b7579f77SDag-Erling Smørgrav 	const uint8_t map_prefix[16] =
753b7579f77SDag-Erling Smørgrav 		{0,0,0,0,  0,0,0,0, 0,0,0xff,0xff, 0,0,0,0};
754b7579f77SDag-Erling Smørgrav 	uint8_t* s;
755b7579f77SDag-Erling Smørgrav 	if(!addr_is_ip6(addr, addrlen))
756b7579f77SDag-Erling Smørgrav 		return 0;
757b7579f77SDag-Erling Smørgrav 	/* s is 16 octet ipv6 address string */
758b7579f77SDag-Erling Smørgrav 	s = (uint8_t*)&((struct sockaddr_in6*)addr)->sin6_addr;
759b7579f77SDag-Erling Smørgrav 	return (memcmp(s, map_prefix, 12) == 0);
760b7579f77SDag-Erling Smørgrav }
761b7579f77SDag-Erling Smørgrav 
762b7579f77SDag-Erling Smørgrav int addr_is_broadcast(struct sockaddr_storage* addr, socklen_t addrlen)
763b7579f77SDag-Erling Smørgrav {
764b7579f77SDag-Erling Smørgrav 	int af = (int)((struct sockaddr_in*)addr)->sin_family;
765b7579f77SDag-Erling Smørgrav 	void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr;
766b7579f77SDag-Erling Smørgrav 	return af == AF_INET && addrlen>=(socklen_t)sizeof(struct sockaddr_in)
767b7579f77SDag-Erling Smørgrav 		&& memcmp(sinaddr, "\377\377\377\377", 4) == 0;
768b7579f77SDag-Erling Smørgrav }
769b7579f77SDag-Erling Smørgrav 
770b7579f77SDag-Erling Smørgrav int addr_is_any(struct sockaddr_storage* addr, socklen_t addrlen)
771b7579f77SDag-Erling Smørgrav {
772b7579f77SDag-Erling Smørgrav 	int af = (int)((struct sockaddr_in*)addr)->sin_family;
773b7579f77SDag-Erling Smørgrav 	void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr;
774b7579f77SDag-Erling Smørgrav 	void* sin6addr = &((struct sockaddr_in6*)addr)->sin6_addr;
775b7579f77SDag-Erling Smørgrav 	if(af == AF_INET && addrlen>=(socklen_t)sizeof(struct sockaddr_in)
776b7579f77SDag-Erling Smørgrav 		&& memcmp(sinaddr, "\000\000\000\000", 4) == 0)
777b7579f77SDag-Erling Smørgrav 		return 1;
778b7579f77SDag-Erling Smørgrav 	else if(af==AF_INET6 && addrlen>=(socklen_t)sizeof(struct sockaddr_in6)
779b7579f77SDag-Erling Smørgrav 		&& memcmp(sin6addr, "\000\000\000\000\000\000\000\000"
780b7579f77SDag-Erling Smørgrav 		"\000\000\000\000\000\000\000\000", 16) == 0)
781b7579f77SDag-Erling Smørgrav 		return 1;
782b7579f77SDag-Erling Smørgrav 	return 0;
783b7579f77SDag-Erling Smørgrav }
784b7579f77SDag-Erling Smørgrav 
785b7579f77SDag-Erling Smørgrav void sock_list_insert(struct sock_list** list, struct sockaddr_storage* addr,
786b7579f77SDag-Erling Smørgrav 	socklen_t len, struct regional* region)
787b7579f77SDag-Erling Smørgrav {
788b7579f77SDag-Erling Smørgrav 	struct sock_list* add = (struct sock_list*)regional_alloc(region,
789b7579f77SDag-Erling Smørgrav 		sizeof(*add) - sizeof(add->addr) + (size_t)len);
790b7579f77SDag-Erling Smørgrav 	if(!add) {
791b7579f77SDag-Erling Smørgrav 		log_err("out of memory in socketlist insert");
792b7579f77SDag-Erling Smørgrav 		return;
793b7579f77SDag-Erling Smørgrav 	}
794b7579f77SDag-Erling Smørgrav 	log_assert(list);
795b7579f77SDag-Erling Smørgrav 	add->next = *list;
796b7579f77SDag-Erling Smørgrav 	add->len = len;
797b7579f77SDag-Erling Smørgrav 	*list = add;
798b7579f77SDag-Erling Smørgrav 	if(len) memmove(&add->addr, addr, len);
799b7579f77SDag-Erling Smørgrav }
800b7579f77SDag-Erling Smørgrav 
801b7579f77SDag-Erling Smørgrav void sock_list_prepend(struct sock_list** list, struct sock_list* add)
802b7579f77SDag-Erling Smørgrav {
803b7579f77SDag-Erling Smørgrav 	struct sock_list* last = add;
804b7579f77SDag-Erling Smørgrav 	if(!last)
805b7579f77SDag-Erling Smørgrav 		return;
806b7579f77SDag-Erling Smørgrav 	while(last->next)
807b7579f77SDag-Erling Smørgrav 		last = last->next;
808b7579f77SDag-Erling Smørgrav 	last->next = *list;
809b7579f77SDag-Erling Smørgrav 	*list = add;
810b7579f77SDag-Erling Smørgrav }
811b7579f77SDag-Erling Smørgrav 
812b7579f77SDag-Erling Smørgrav int sock_list_find(struct sock_list* list, struct sockaddr_storage* addr,
813b7579f77SDag-Erling Smørgrav         socklen_t len)
814b7579f77SDag-Erling Smørgrav {
815b7579f77SDag-Erling Smørgrav 	while(list) {
816b7579f77SDag-Erling Smørgrav 		if(len == list->len) {
817b7579f77SDag-Erling Smørgrav 			if(len == 0 || sockaddr_cmp_addr(addr, len,
818b7579f77SDag-Erling Smørgrav 				&list->addr, list->len) == 0)
819b7579f77SDag-Erling Smørgrav 				return 1;
820b7579f77SDag-Erling Smørgrav 		}
821b7579f77SDag-Erling Smørgrav 		list = list->next;
822b7579f77SDag-Erling Smørgrav 	}
823b7579f77SDag-Erling Smørgrav 	return 0;
824b7579f77SDag-Erling Smørgrav }
825b7579f77SDag-Erling Smørgrav 
826b7579f77SDag-Erling Smørgrav void sock_list_merge(struct sock_list** list, struct regional* region,
827b7579f77SDag-Erling Smørgrav 	struct sock_list* add)
828b7579f77SDag-Erling Smørgrav {
829b7579f77SDag-Erling Smørgrav 	struct sock_list* p;
830b7579f77SDag-Erling Smørgrav 	for(p=add; p; p=p->next) {
831b7579f77SDag-Erling Smørgrav 		if(!sock_list_find(*list, &p->addr, p->len))
832b7579f77SDag-Erling Smørgrav 			sock_list_insert(list, &p->addr, p->len, region);
833b7579f77SDag-Erling Smørgrav 	}
834b7579f77SDag-Erling Smørgrav }
835b7579f77SDag-Erling Smørgrav 
836b7579f77SDag-Erling Smørgrav void
837b7579f77SDag-Erling Smørgrav log_crypto_err(const char* str)
838b7579f77SDag-Erling Smørgrav {
8398ed2b524SDag-Erling Smørgrav #ifdef HAVE_SSL
8400eefd307SCy Schubert 	log_crypto_err_code(str, ERR_get_error());
8410eefd307SCy Schubert #else
8420eefd307SCy Schubert 	(void)str;
8430eefd307SCy Schubert #endif /* HAVE_SSL */
8440eefd307SCy Schubert }
8450eefd307SCy Schubert 
8460eefd307SCy Schubert void log_crypto_err_code(const char* str, unsigned long err)
8470eefd307SCy Schubert {
8480eefd307SCy Schubert #ifdef HAVE_SSL
849b7579f77SDag-Erling Smørgrav 	/* error:[error code]:[library name]:[function name]:[reason string] */
850b7579f77SDag-Erling Smørgrav 	char buf[128];
851b7579f77SDag-Erling Smørgrav 	unsigned long e;
8520eefd307SCy Schubert 	ERR_error_string_n(err, buf, sizeof(buf));
853b7579f77SDag-Erling Smørgrav 	log_err("%s crypto %s", str, buf);
854b7579f77SDag-Erling Smørgrav 	while( (e=ERR_get_error()) ) {
855b7579f77SDag-Erling Smørgrav 		ERR_error_string_n(e, buf, sizeof(buf));
856b7579f77SDag-Erling Smørgrav 		log_err("and additionally crypto %s", buf);
857b7579f77SDag-Erling Smørgrav 	}
8588ed2b524SDag-Erling Smørgrav #else
8598ed2b524SDag-Erling Smørgrav 	(void)str;
8600eefd307SCy Schubert 	(void)err;
8618ed2b524SDag-Erling Smørgrav #endif /* HAVE_SSL */
862b7579f77SDag-Erling Smørgrav }
863b7579f77SDag-Erling Smørgrav 
86425039b37SCy Schubert #ifdef HAVE_SSL
86525039b37SCy Schubert /** log certificate details */
86625039b37SCy Schubert void
86725039b37SCy Schubert log_cert(unsigned level, const char* str, void* cert)
86825039b37SCy Schubert {
86925039b37SCy Schubert 	BIO* bio;
87025039b37SCy Schubert 	char nul = 0;
87125039b37SCy Schubert 	char* pp = NULL;
87225039b37SCy Schubert 	long len;
87325039b37SCy Schubert 	if(verbosity < level) return;
87425039b37SCy Schubert 	bio = BIO_new(BIO_s_mem());
87525039b37SCy Schubert 	if(!bio) return;
87625039b37SCy Schubert 	X509_print_ex(bio, (X509*)cert, 0, (unsigned long)-1
87725039b37SCy Schubert 		^(X509_FLAG_NO_SUBJECT
87825039b37SCy Schubert                         |X509_FLAG_NO_ISSUER|X509_FLAG_NO_VALIDITY
87925039b37SCy Schubert 			|X509_FLAG_NO_EXTENSIONS|X509_FLAG_NO_AUX
88025039b37SCy Schubert 			|X509_FLAG_NO_ATTRIBUTES));
88125039b37SCy Schubert 	BIO_write(bio, &nul, (int)sizeof(nul));
88225039b37SCy Schubert 	len = BIO_get_mem_data(bio, &pp);
88325039b37SCy Schubert 	if(len != 0 && pp) {
88425039b37SCy Schubert 		verbose(level, "%s: \n%s", str, pp);
88525039b37SCy Schubert 	}
88625039b37SCy Schubert 	BIO_free(bio);
88725039b37SCy Schubert }
88825039b37SCy Schubert #endif /* HAVE_SSL */
88925039b37SCy Schubert 
890*c0caa2e2SCy Schubert #if defined(HAVE_SSL) && defined(HAVE_NGHTTP2)
891*c0caa2e2SCy Schubert static int alpn_select_cb(SSL* ATTR_UNUSED(ssl), const unsigned char** out,
892*c0caa2e2SCy Schubert 	unsigned char* outlen, const unsigned char* in, unsigned int inlen,
893*c0caa2e2SCy Schubert 	void* ATTR_UNUSED(arg))
894*c0caa2e2SCy Schubert {
895*c0caa2e2SCy Schubert 	int rv = nghttp2_select_next_protocol((unsigned char **)out, outlen, in,
896*c0caa2e2SCy Schubert 		inlen);
897*c0caa2e2SCy Schubert 	if(rv == -1) {
898*c0caa2e2SCy Schubert 		return SSL_TLSEXT_ERR_NOACK;
899*c0caa2e2SCy Schubert 	}
900*c0caa2e2SCy Schubert 	/* either http/1.1 or h2 selected */
901*c0caa2e2SCy Schubert 	return SSL_TLSEXT_ERR_OK;
902*c0caa2e2SCy Schubert }
903*c0caa2e2SCy Schubert #endif
904*c0caa2e2SCy Schubert 
905971980c3SDag-Erling Smørgrav int
906971980c3SDag-Erling Smørgrav listen_sslctx_setup(void* ctxt)
907971980c3SDag-Erling Smørgrav {
908971980c3SDag-Erling Smørgrav #ifdef HAVE_SSL
909971980c3SDag-Erling Smørgrav 	SSL_CTX* ctx = (SSL_CTX*)ctxt;
910971980c3SDag-Erling Smørgrav 	/* no SSLv2, SSLv3 because has defects */
911091e9e46SCy Schubert #if SSL_OP_NO_SSLv2 != 0
912971980c3SDag-Erling Smørgrav 	if((SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv2) & SSL_OP_NO_SSLv2)
913971980c3SDag-Erling Smørgrav 		!= SSL_OP_NO_SSLv2){
914971980c3SDag-Erling Smørgrav 		log_crypto_err("could not set SSL_OP_NO_SSLv2");
915971980c3SDag-Erling Smørgrav 		return 0;
916971980c3SDag-Erling Smørgrav 	}
917091e9e46SCy Schubert #endif
918971980c3SDag-Erling Smørgrav 	if((SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv3) & SSL_OP_NO_SSLv3)
919971980c3SDag-Erling Smørgrav 		!= SSL_OP_NO_SSLv3){
920971980c3SDag-Erling Smørgrav 		log_crypto_err("could not set SSL_OP_NO_SSLv3");
921971980c3SDag-Erling Smørgrav 		return 0;
922971980c3SDag-Erling Smørgrav 	}
923971980c3SDag-Erling Smørgrav #if defined(SSL_OP_NO_TLSv1) && defined(SSL_OP_NO_TLSv1_1)
924971980c3SDag-Erling Smørgrav 	/* if we have tls 1.1 disable 1.0 */
925971980c3SDag-Erling Smørgrav 	if((SSL_CTX_set_options(ctx, SSL_OP_NO_TLSv1) & SSL_OP_NO_TLSv1)
926971980c3SDag-Erling Smørgrav 		!= SSL_OP_NO_TLSv1){
927971980c3SDag-Erling Smørgrav 		log_crypto_err("could not set SSL_OP_NO_TLSv1");
928971980c3SDag-Erling Smørgrav 		return 0;
929971980c3SDag-Erling Smørgrav 	}
930971980c3SDag-Erling Smørgrav #endif
931971980c3SDag-Erling Smørgrav #if defined(SSL_OP_NO_TLSv1_1) && defined(SSL_OP_NO_TLSv1_2)
932971980c3SDag-Erling Smørgrav 	/* if we have tls 1.2 disable 1.1 */
933971980c3SDag-Erling Smørgrav 	if((SSL_CTX_set_options(ctx, SSL_OP_NO_TLSv1_1) & SSL_OP_NO_TLSv1_1)
934971980c3SDag-Erling Smørgrav 		!= SSL_OP_NO_TLSv1_1){
935971980c3SDag-Erling Smørgrav 		log_crypto_err("could not set SSL_OP_NO_TLSv1_1");
936971980c3SDag-Erling Smørgrav 		return 0;
937971980c3SDag-Erling Smørgrav 	}
938971980c3SDag-Erling Smørgrav #endif
9390eefd307SCy Schubert #if defined(SSL_OP_NO_RENEGOTIATION)
9400eefd307SCy Schubert 	/* disable client renegotiation */
9410eefd307SCy Schubert 	if((SSL_CTX_set_options(ctx, SSL_OP_NO_RENEGOTIATION) &
9420eefd307SCy Schubert 		SSL_OP_NO_RENEGOTIATION) != SSL_OP_NO_RENEGOTIATION) {
9430eefd307SCy Schubert 		log_crypto_err("could not set SSL_OP_NO_RENEGOTIATION");
9440eefd307SCy Schubert 		return 0;
9450eefd307SCy Schubert 	}
9460eefd307SCy Schubert #endif
947971980c3SDag-Erling Smørgrav #if defined(SHA256_DIGEST_LENGTH) && defined(USE_ECDSA)
948971980c3SDag-Erling Smørgrav 	/* if we have sha256, set the cipher list to have no known vulns */
94957bddd21SDag-Erling Smørgrav 	if(!SSL_CTX_set_cipher_list(ctx, "TLS13-CHACHA20-POLY1305-SHA256:TLS13-AES-256-GCM-SHA384:TLS13-AES-128-GCM-SHA256:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256"))
950971980c3SDag-Erling Smørgrav 		log_crypto_err("could not set cipher list with SSL_CTX_set_cipher_list");
951971980c3SDag-Erling Smørgrav #endif
952971980c3SDag-Erling Smørgrav 
953971980c3SDag-Erling Smørgrav 	if((SSL_CTX_set_options(ctx, SSL_OP_CIPHER_SERVER_PREFERENCE) &
954971980c3SDag-Erling Smørgrav 		SSL_OP_CIPHER_SERVER_PREFERENCE) !=
955971980c3SDag-Erling Smørgrav 		SSL_OP_CIPHER_SERVER_PREFERENCE) {
956971980c3SDag-Erling Smørgrav 		log_crypto_err("could not set SSL_OP_CIPHER_SERVER_PREFERENCE");
957971980c3SDag-Erling Smørgrav 		return 0;
958971980c3SDag-Erling Smørgrav 	}
959971980c3SDag-Erling Smørgrav 
960971980c3SDag-Erling Smørgrav #ifdef HAVE_SSL_CTX_SET_SECURITY_LEVEL
961971980c3SDag-Erling Smørgrav 	SSL_CTX_set_security_level(ctx, 0);
962971980c3SDag-Erling Smørgrav #endif
963*c0caa2e2SCy Schubert #if defined(HAVE_SSL_CTX_SET_ALPN_SELECT_CB) && defined(HAVE_NGHTTP2)
964*c0caa2e2SCy Schubert 	SSL_CTX_set_alpn_select_cb(ctx, alpn_select_cb, NULL);
965*c0caa2e2SCy Schubert #endif
966971980c3SDag-Erling Smørgrav #else
967971980c3SDag-Erling Smørgrav 	(void)ctxt;
968971980c3SDag-Erling Smørgrav #endif /* HAVE_SSL */
969971980c3SDag-Erling Smørgrav 	return 1;
970971980c3SDag-Erling Smørgrav }
971971980c3SDag-Erling Smørgrav 
972971980c3SDag-Erling Smørgrav void
973971980c3SDag-Erling Smørgrav listen_sslctx_setup_2(void* ctxt)
974971980c3SDag-Erling Smørgrav {
975971980c3SDag-Erling Smørgrav #ifdef HAVE_SSL
976971980c3SDag-Erling Smørgrav 	SSL_CTX* ctx = (SSL_CTX*)ctxt;
977971980c3SDag-Erling Smørgrav 	(void)ctx;
978971980c3SDag-Erling Smørgrav #if HAVE_DECL_SSL_CTX_SET_ECDH_AUTO
979971980c3SDag-Erling Smørgrav 	if(!SSL_CTX_set_ecdh_auto(ctx,1)) {
980971980c3SDag-Erling Smørgrav 		log_crypto_err("Error in SSL_CTX_ecdh_auto, not enabling ECDHE");
981971980c3SDag-Erling Smørgrav 	}
982971980c3SDag-Erling Smørgrav #elif defined(USE_ECDSA)
983971980c3SDag-Erling Smørgrav 	if(1) {
984971980c3SDag-Erling Smørgrav 		EC_KEY *ecdh = EC_KEY_new_by_curve_name (NID_X9_62_prime256v1);
985971980c3SDag-Erling Smørgrav 		if (!ecdh) {
986971980c3SDag-Erling Smørgrav 			log_crypto_err("could not find p256, not enabling ECDHE");
987971980c3SDag-Erling Smørgrav 		} else {
988971980c3SDag-Erling Smørgrav 			if (1 != SSL_CTX_set_tmp_ecdh (ctx, ecdh)) {
989971980c3SDag-Erling Smørgrav 				log_crypto_err("Error in SSL_CTX_set_tmp_ecdh, not enabling ECDHE");
990971980c3SDag-Erling Smørgrav 			}
991971980c3SDag-Erling Smørgrav 			EC_KEY_free (ecdh);
992971980c3SDag-Erling Smørgrav 		}
993971980c3SDag-Erling Smørgrav 	}
994971980c3SDag-Erling Smørgrav #endif
995971980c3SDag-Erling Smørgrav #else
996971980c3SDag-Erling Smørgrav 	(void)ctxt;
997971980c3SDag-Erling Smørgrav #endif /* HAVE_SSL */
998971980c3SDag-Erling Smørgrav }
999971980c3SDag-Erling Smørgrav 
1000b7579f77SDag-Erling Smørgrav void* listen_sslctx_create(char* key, char* pem, char* verifypem)
1001b7579f77SDag-Erling Smørgrav {
10028ed2b524SDag-Erling Smørgrav #ifdef HAVE_SSL
1003b7579f77SDag-Erling Smørgrav 	SSL_CTX* ctx = SSL_CTX_new(SSLv23_server_method());
1004b7579f77SDag-Erling Smørgrav 	if(!ctx) {
1005b7579f77SDag-Erling Smørgrav 		log_crypto_err("could not SSL_CTX_new");
1006b7579f77SDag-Erling Smørgrav 		return NULL;
1007b7579f77SDag-Erling Smørgrav 	}
1008e86b9096SDag-Erling Smørgrav 	if(!key || key[0] == 0) {
1009e86b9096SDag-Erling Smørgrav 		log_err("error: no tls-service-key file specified");
1010e86b9096SDag-Erling Smørgrav 		SSL_CTX_free(ctx);
1011e86b9096SDag-Erling Smørgrav 		return NULL;
1012e86b9096SDag-Erling Smørgrav 	}
1013e86b9096SDag-Erling Smørgrav 	if(!pem || pem[0] == 0) {
1014e86b9096SDag-Erling Smørgrav 		log_err("error: no tls-service-pem file specified");
1015e86b9096SDag-Erling Smørgrav 		SSL_CTX_free(ctx);
1016e86b9096SDag-Erling Smørgrav 		return NULL;
1017e86b9096SDag-Erling Smørgrav 	}
1018971980c3SDag-Erling Smørgrav 	if(!listen_sslctx_setup(ctx)) {
1019ff825849SDag-Erling Smørgrav 		SSL_CTX_free(ctx);
1020ff825849SDag-Erling Smørgrav 		return NULL;
1021ff825849SDag-Erling Smørgrav 	}
1022b75612f8SDag-Erling Smørgrav 	if(!SSL_CTX_use_certificate_chain_file(ctx, pem)) {
1023b7579f77SDag-Erling Smørgrav 		log_err("error for cert file: %s", pem);
1024b75612f8SDag-Erling Smørgrav 		log_crypto_err("error in SSL_CTX use_certificate_chain_file");
1025b7579f77SDag-Erling Smørgrav 		SSL_CTX_free(ctx);
1026b7579f77SDag-Erling Smørgrav 		return NULL;
1027b7579f77SDag-Erling Smørgrav 	}
1028b7579f77SDag-Erling Smørgrav 	if(!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM)) {
1029b7579f77SDag-Erling Smørgrav 		log_err("error for private key file: %s", key);
1030b7579f77SDag-Erling Smørgrav 		log_crypto_err("Error in SSL_CTX use_PrivateKey_file");
1031b7579f77SDag-Erling Smørgrav 		SSL_CTX_free(ctx);
1032b7579f77SDag-Erling Smørgrav 		return NULL;
1033b7579f77SDag-Erling Smørgrav 	}
1034b7579f77SDag-Erling Smørgrav 	if(!SSL_CTX_check_private_key(ctx)) {
1035b7579f77SDag-Erling Smørgrav 		log_err("error for key file: %s", key);
1036b7579f77SDag-Erling Smørgrav 		log_crypto_err("Error in SSL_CTX check_private_key");
1037b7579f77SDag-Erling Smørgrav 		SSL_CTX_free(ctx);
1038b7579f77SDag-Erling Smørgrav 		return NULL;
1039b7579f77SDag-Erling Smørgrav 	}
1040971980c3SDag-Erling Smørgrav 	listen_sslctx_setup_2(ctx);
1041b7579f77SDag-Erling Smørgrav 	if(verifypem && verifypem[0]) {
1042b7579f77SDag-Erling Smørgrav 		if(!SSL_CTX_load_verify_locations(ctx, verifypem, NULL)) {
1043b7579f77SDag-Erling Smørgrav 			log_crypto_err("Error in SSL_CTX verify locations");
1044b7579f77SDag-Erling Smørgrav 			SSL_CTX_free(ctx);
1045b7579f77SDag-Erling Smørgrav 			return NULL;
1046b7579f77SDag-Erling Smørgrav 		}
1047b7579f77SDag-Erling Smørgrav 		SSL_CTX_set_client_CA_list(ctx, SSL_load_client_CA_file(
1048b7579f77SDag-Erling Smørgrav 			verifypem));
104925039b37SCy Schubert 		SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER|SSL_VERIFY_FAIL_IF_NO_PEER_CERT, NULL);
1050b7579f77SDag-Erling Smørgrav 	}
1051b7579f77SDag-Erling Smørgrav 	return ctx;
10528ed2b524SDag-Erling Smørgrav #else
10538ed2b524SDag-Erling Smørgrav 	(void)key; (void)pem; (void)verifypem;
10548ed2b524SDag-Erling Smørgrav 	return NULL;
10558ed2b524SDag-Erling Smørgrav #endif
1056b7579f77SDag-Erling Smørgrav }
1057b7579f77SDag-Erling Smørgrav 
10583bd4df0aSDag-Erling Smørgrav #ifdef USE_WINSOCK
10593bd4df0aSDag-Erling Smørgrav /* For windows, the CA trust store is not read by openssl.
10603bd4df0aSDag-Erling Smørgrav    Add code to open the trust store using wincrypt API and add
10613bd4df0aSDag-Erling Smørgrav    the root certs into openssl trust store */
10623bd4df0aSDag-Erling Smørgrav static int
10633bd4df0aSDag-Erling Smørgrav add_WIN_cacerts_to_openssl_store(SSL_CTX* tls_ctx)
10643bd4df0aSDag-Erling Smørgrav {
10653bd4df0aSDag-Erling Smørgrav 	HCERTSTORE      hSystemStore;
10663bd4df0aSDag-Erling Smørgrav 	PCCERT_CONTEXT  pTargetCert = NULL;
10673bd4df0aSDag-Erling Smørgrav 	X509_STORE*	store;
10683bd4df0aSDag-Erling Smørgrav 
10693bd4df0aSDag-Erling Smørgrav 	verbose(VERB_ALGO, "Adding Windows certificates from system root store to CA store");
10703bd4df0aSDag-Erling Smørgrav 
10713bd4df0aSDag-Erling Smørgrav 	/* load just once per context lifetime for this version
10723bd4df0aSDag-Erling Smørgrav 	   TODO: dynamically update CA trust changes as they are available */
10733bd4df0aSDag-Erling Smørgrav 	if (!tls_ctx)
10743bd4df0aSDag-Erling Smørgrav 		return 0;
10753bd4df0aSDag-Erling Smørgrav 
10763bd4df0aSDag-Erling Smørgrav 	/* Call wincrypt's CertOpenStore to open the CA root store. */
10773bd4df0aSDag-Erling Smørgrav 
10783bd4df0aSDag-Erling Smørgrav 	if ((hSystemStore = CertOpenStore(
10793bd4df0aSDag-Erling Smørgrav 		CERT_STORE_PROV_SYSTEM,
10803bd4df0aSDag-Erling Smørgrav 		0,
10813bd4df0aSDag-Erling Smørgrav 		0,
10823bd4df0aSDag-Erling Smørgrav 		/* NOTE: mingw does not have this const: replace with 1 << 16 from code
10833bd4df0aSDag-Erling Smørgrav 		   CERT_SYSTEM_STORE_CURRENT_USER, */
10843bd4df0aSDag-Erling Smørgrav 		1 << 16,
10853bd4df0aSDag-Erling Smørgrav 		L"root")) == 0)
10863bd4df0aSDag-Erling Smørgrav 	{
10873bd4df0aSDag-Erling Smørgrav 		return 0;
10883bd4df0aSDag-Erling Smørgrav 	}
10893bd4df0aSDag-Erling Smørgrav 
10903bd4df0aSDag-Erling Smørgrav 	store = SSL_CTX_get_cert_store(tls_ctx);
10913bd4df0aSDag-Erling Smørgrav 	if (!store)
10923bd4df0aSDag-Erling Smørgrav 		return 0;
10933bd4df0aSDag-Erling Smørgrav 
10943bd4df0aSDag-Erling Smørgrav 	/* failure if the CA store is empty or the call fails */
10953bd4df0aSDag-Erling Smørgrav 	if ((pTargetCert = CertEnumCertificatesInStore(
10963bd4df0aSDag-Erling Smørgrav 		hSystemStore, pTargetCert)) == 0) {
10973bd4df0aSDag-Erling Smørgrav 		verbose(VERB_ALGO, "CA certificate store for Windows is empty.");
10983bd4df0aSDag-Erling Smørgrav 		return 0;
10993bd4df0aSDag-Erling Smørgrav 	}
11003bd4df0aSDag-Erling Smørgrav 	/* iterate over the windows cert store and add to openssl store */
11013bd4df0aSDag-Erling Smørgrav 	do
11023bd4df0aSDag-Erling Smørgrav 	{
11033bd4df0aSDag-Erling Smørgrav 		X509 *cert1 = d2i_X509(NULL,
11043bd4df0aSDag-Erling Smørgrav 			(const unsigned char **)&pTargetCert->pbCertEncoded,
11053bd4df0aSDag-Erling Smørgrav 			pTargetCert->cbCertEncoded);
11063bd4df0aSDag-Erling Smørgrav 		if (!cert1) {
11073bd4df0aSDag-Erling Smørgrav 			/* return error if a cert fails */
11083bd4df0aSDag-Erling Smørgrav 			verbose(VERB_ALGO, "%s %d:%s",
11093bd4df0aSDag-Erling Smørgrav 				"Unable to parse certificate in memory",
11103bd4df0aSDag-Erling Smørgrav 				(int)ERR_get_error(), ERR_error_string(ERR_get_error(), NULL));
11113bd4df0aSDag-Erling Smørgrav 			return 0;
11123bd4df0aSDag-Erling Smørgrav 		}
11133bd4df0aSDag-Erling Smørgrav 		else {
11143bd4df0aSDag-Erling Smørgrav 			/* return error if a cert add to store fails */
11153bd4df0aSDag-Erling Smørgrav 			if (X509_STORE_add_cert(store, cert1) == 0) {
11163bd4df0aSDag-Erling Smørgrav 				unsigned long error = ERR_peek_last_error();
11173bd4df0aSDag-Erling Smørgrav 
11183bd4df0aSDag-Erling Smørgrav 				/* Ignore error X509_R_CERT_ALREADY_IN_HASH_TABLE which means the
11193bd4df0aSDag-Erling Smørgrav 				* certificate is already in the store.  */
11203bd4df0aSDag-Erling Smørgrav 				if(ERR_GET_LIB(error) != ERR_LIB_X509 ||
11213bd4df0aSDag-Erling Smørgrav 				   ERR_GET_REASON(error) != X509_R_CERT_ALREADY_IN_HASH_TABLE) {
11223bd4df0aSDag-Erling Smørgrav 					verbose(VERB_ALGO, "%s %d:%s\n",
11233bd4df0aSDag-Erling Smørgrav 					    "Error adding certificate", (int)ERR_get_error(),
11243bd4df0aSDag-Erling Smørgrav 					     ERR_error_string(ERR_get_error(), NULL));
11253bd4df0aSDag-Erling Smørgrav 					X509_free(cert1);
11263bd4df0aSDag-Erling Smørgrav 					return 0;
11273bd4df0aSDag-Erling Smørgrav 				}
11283bd4df0aSDag-Erling Smørgrav 			}
11293bd4df0aSDag-Erling Smørgrav 			X509_free(cert1);
11303bd4df0aSDag-Erling Smørgrav 		}
11313bd4df0aSDag-Erling Smørgrav 	} while ((pTargetCert = CertEnumCertificatesInStore(
11323bd4df0aSDag-Erling Smørgrav 		hSystemStore, pTargetCert)) != 0);
11333bd4df0aSDag-Erling Smørgrav 
11343bd4df0aSDag-Erling Smørgrav 	/* Clean up memory and quit. */
11353bd4df0aSDag-Erling Smørgrav 	if (pTargetCert)
11363bd4df0aSDag-Erling Smørgrav 		CertFreeCertificateContext(pTargetCert);
11373bd4df0aSDag-Erling Smørgrav 	if (hSystemStore)
11383bd4df0aSDag-Erling Smørgrav 	{
11393bd4df0aSDag-Erling Smørgrav 		if (!CertCloseStore(
11403bd4df0aSDag-Erling Smørgrav 			hSystemStore, 0))
11413bd4df0aSDag-Erling Smørgrav 			return 0;
11423bd4df0aSDag-Erling Smørgrav 	}
11433bd4df0aSDag-Erling Smørgrav 	verbose(VERB_ALGO, "Completed adding Windows certificates to CA store successfully");
11443bd4df0aSDag-Erling Smørgrav 	return 1;
11453bd4df0aSDag-Erling Smørgrav }
11463bd4df0aSDag-Erling Smørgrav #endif /* USE_WINSOCK */
11473bd4df0aSDag-Erling Smørgrav 
11483bd4df0aSDag-Erling Smørgrav void* connect_sslctx_create(char* key, char* pem, char* verifypem, int wincert)
1149b7579f77SDag-Erling Smørgrav {
11508ed2b524SDag-Erling Smørgrav #ifdef HAVE_SSL
1151b7579f77SDag-Erling Smørgrav 	SSL_CTX* ctx = SSL_CTX_new(SSLv23_client_method());
1152b7579f77SDag-Erling Smørgrav 	if(!ctx) {
1153b7579f77SDag-Erling Smørgrav 		log_crypto_err("could not allocate SSL_CTX pointer");
1154b7579f77SDag-Erling Smørgrav 		return NULL;
1155b7579f77SDag-Erling Smørgrav 	}
1156091e9e46SCy Schubert #if SSL_OP_NO_SSLv2 != 0
115705ab2901SDag-Erling Smørgrav 	if((SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv2) & SSL_OP_NO_SSLv2)
115805ab2901SDag-Erling Smørgrav 		!= SSL_OP_NO_SSLv2) {
1159b7579f77SDag-Erling Smørgrav 		log_crypto_err("could not set SSL_OP_NO_SSLv2");
1160b7579f77SDag-Erling Smørgrav 		SSL_CTX_free(ctx);
1161b7579f77SDag-Erling Smørgrav 		return NULL;
1162b7579f77SDag-Erling Smørgrav 	}
1163091e9e46SCy Schubert #endif
116405ab2901SDag-Erling Smørgrav 	if((SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv3) & SSL_OP_NO_SSLv3)
116505ab2901SDag-Erling Smørgrav 		!= SSL_OP_NO_SSLv3) {
1166ff825849SDag-Erling Smørgrav 		log_crypto_err("could not set SSL_OP_NO_SSLv3");
1167ff825849SDag-Erling Smørgrav 		SSL_CTX_free(ctx);
1168ff825849SDag-Erling Smørgrav 		return NULL;
1169ff825849SDag-Erling Smørgrav 	}
11700eefd307SCy Schubert #if defined(SSL_OP_NO_RENEGOTIATION)
11710eefd307SCy Schubert 	/* disable client renegotiation */
11720eefd307SCy Schubert 	if((SSL_CTX_set_options(ctx, SSL_OP_NO_RENEGOTIATION) &
11730eefd307SCy Schubert 		SSL_OP_NO_RENEGOTIATION) != SSL_OP_NO_RENEGOTIATION) {
11740eefd307SCy Schubert 		log_crypto_err("could not set SSL_OP_NO_RENEGOTIATION");
11750eefd307SCy Schubert 		return 0;
11760eefd307SCy Schubert 	}
11770eefd307SCy Schubert #endif
1178b7579f77SDag-Erling Smørgrav 	if(key && key[0]) {
1179b75612f8SDag-Erling Smørgrav 		if(!SSL_CTX_use_certificate_chain_file(ctx, pem)) {
1180b7579f77SDag-Erling Smørgrav 			log_err("error in client certificate %s", pem);
1181b7579f77SDag-Erling Smørgrav 			log_crypto_err("error in certificate file");
1182b7579f77SDag-Erling Smørgrav 			SSL_CTX_free(ctx);
1183b7579f77SDag-Erling Smørgrav 			return NULL;
1184b7579f77SDag-Erling Smørgrav 		}
1185b7579f77SDag-Erling Smørgrav 		if(!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM)) {
1186b7579f77SDag-Erling Smørgrav 			log_err("error in client private key %s", key);
1187b7579f77SDag-Erling Smørgrav 			log_crypto_err("error in key file");
1188b7579f77SDag-Erling Smørgrav 			SSL_CTX_free(ctx);
1189b7579f77SDag-Erling Smørgrav 			return NULL;
1190b7579f77SDag-Erling Smørgrav 		}
1191b7579f77SDag-Erling Smørgrav 		if(!SSL_CTX_check_private_key(ctx)) {
1192b7579f77SDag-Erling Smørgrav 			log_err("error in client key %s", key);
1193b7579f77SDag-Erling Smørgrav 			log_crypto_err("error in SSL_CTX_check_private_key");
1194b7579f77SDag-Erling Smørgrav 			SSL_CTX_free(ctx);
1195b7579f77SDag-Erling Smørgrav 			return NULL;
1196b7579f77SDag-Erling Smørgrav 		}
1197b7579f77SDag-Erling Smørgrav 	}
11983bd4df0aSDag-Erling Smørgrav 	if((verifypem && verifypem[0]) || wincert) {
1199b7579f77SDag-Erling Smørgrav 		if(verifypem && verifypem[0]) {
1200ff825849SDag-Erling Smørgrav 			if(!SSL_CTX_load_verify_locations(ctx, verifypem, NULL)) {
1201b7579f77SDag-Erling Smørgrav 				log_crypto_err("error in SSL_CTX verify");
1202b7579f77SDag-Erling Smørgrav 				SSL_CTX_free(ctx);
1203b7579f77SDag-Erling Smørgrav 				return NULL;
1204b7579f77SDag-Erling Smørgrav 			}
12053bd4df0aSDag-Erling Smørgrav 		}
12063bd4df0aSDag-Erling Smørgrav #ifdef USE_WINSOCK
12073bd4df0aSDag-Erling Smørgrav 		if(wincert) {
12083bd4df0aSDag-Erling Smørgrav 			if(!add_WIN_cacerts_to_openssl_store(ctx)) {
12093bd4df0aSDag-Erling Smørgrav 				log_crypto_err("error in add_WIN_cacerts_to_openssl_store");
12103bd4df0aSDag-Erling Smørgrav 				SSL_CTX_free(ctx);
12113bd4df0aSDag-Erling Smørgrav 				return NULL;
12123bd4df0aSDag-Erling Smørgrav 			}
12133bd4df0aSDag-Erling Smørgrav 		}
12143bd4df0aSDag-Erling Smørgrav #else
12153bd4df0aSDag-Erling Smørgrav 		(void)wincert;
12163bd4df0aSDag-Erling Smørgrav #endif
1217b7579f77SDag-Erling Smørgrav 		SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, NULL);
1218b7579f77SDag-Erling Smørgrav 	}
1219b7579f77SDag-Erling Smørgrav 	return ctx;
12208ed2b524SDag-Erling Smørgrav #else
12213bd4df0aSDag-Erling Smørgrav 	(void)key; (void)pem; (void)verifypem; (void)wincert;
12228ed2b524SDag-Erling Smørgrav 	return NULL;
12238ed2b524SDag-Erling Smørgrav #endif
1224b7579f77SDag-Erling Smørgrav }
1225b7579f77SDag-Erling Smørgrav 
1226b7579f77SDag-Erling Smørgrav void* incoming_ssl_fd(void* sslctx, int fd)
1227b7579f77SDag-Erling Smørgrav {
12288ed2b524SDag-Erling Smørgrav #ifdef HAVE_SSL
1229b7579f77SDag-Erling Smørgrav 	SSL* ssl = SSL_new((SSL_CTX*)sslctx);
1230b7579f77SDag-Erling Smørgrav 	if(!ssl) {
1231b7579f77SDag-Erling Smørgrav 		log_crypto_err("could not SSL_new");
1232b7579f77SDag-Erling Smørgrav 		return NULL;
1233b7579f77SDag-Erling Smørgrav 	}
1234b7579f77SDag-Erling Smørgrav 	SSL_set_accept_state(ssl);
12350eefd307SCy Schubert 	(void)SSL_set_mode(ssl, (long)SSL_MODE_AUTO_RETRY);
1236b7579f77SDag-Erling Smørgrav 	if(!SSL_set_fd(ssl, fd)) {
1237b7579f77SDag-Erling Smørgrav 		log_crypto_err("could not SSL_set_fd");
1238b7579f77SDag-Erling Smørgrav 		SSL_free(ssl);
1239b7579f77SDag-Erling Smørgrav 		return NULL;
1240b7579f77SDag-Erling Smørgrav 	}
1241b7579f77SDag-Erling Smørgrav 	return ssl;
12428ed2b524SDag-Erling Smørgrav #else
12438ed2b524SDag-Erling Smørgrav 	(void)sslctx; (void)fd;
12448ed2b524SDag-Erling Smørgrav 	return NULL;
12458ed2b524SDag-Erling Smørgrav #endif
1246b7579f77SDag-Erling Smørgrav }
1247b7579f77SDag-Erling Smørgrav 
1248b7579f77SDag-Erling Smørgrav void* outgoing_ssl_fd(void* sslctx, int fd)
1249b7579f77SDag-Erling Smørgrav {
12508ed2b524SDag-Erling Smørgrav #ifdef HAVE_SSL
1251b7579f77SDag-Erling Smørgrav 	SSL* ssl = SSL_new((SSL_CTX*)sslctx);
1252b7579f77SDag-Erling Smørgrav 	if(!ssl) {
1253b7579f77SDag-Erling Smørgrav 		log_crypto_err("could not SSL_new");
1254b7579f77SDag-Erling Smørgrav 		return NULL;
1255b7579f77SDag-Erling Smørgrav 	}
1256b7579f77SDag-Erling Smørgrav 	SSL_set_connect_state(ssl);
12570eefd307SCy Schubert 	(void)SSL_set_mode(ssl, (long)SSL_MODE_AUTO_RETRY);
1258b7579f77SDag-Erling Smørgrav 	if(!SSL_set_fd(ssl, fd)) {
1259b7579f77SDag-Erling Smørgrav 		log_crypto_err("could not SSL_set_fd");
1260b7579f77SDag-Erling Smørgrav 		SSL_free(ssl);
1261b7579f77SDag-Erling Smørgrav 		return NULL;
1262b7579f77SDag-Erling Smørgrav 	}
1263b7579f77SDag-Erling Smørgrav 	return ssl;
12648ed2b524SDag-Erling Smørgrav #else
12658ed2b524SDag-Erling Smørgrav 	(void)sslctx; (void)fd;
12668ed2b524SDag-Erling Smørgrav 	return NULL;
12678ed2b524SDag-Erling Smørgrav #endif
1268b7579f77SDag-Erling Smørgrav }
12698ed2b524SDag-Erling Smørgrav 
127025039b37SCy Schubert int check_auth_name_for_ssl(char* auth_name)
127125039b37SCy Schubert {
127225039b37SCy Schubert 	if(!auth_name) return 1;
127325039b37SCy Schubert #if defined(HAVE_SSL) && !defined(HAVE_SSL_SET1_HOST) && !defined(HAVE_X509_VERIFY_PARAM_SET1_HOST)
127425039b37SCy Schubert 	log_err("the query has an auth_name %s, but libssl has no call to "
127525039b37SCy Schubert 		"perform TLS authentication.  Remove that name from config "
127625039b37SCy Schubert 		"or upgrade the ssl crypto library.", auth_name);
127725039b37SCy Schubert 	return 0;
127825039b37SCy Schubert #else
127925039b37SCy Schubert 	return 1;
128025039b37SCy Schubert #endif
128125039b37SCy Schubert }
128225039b37SCy Schubert 
128325039b37SCy Schubert /** set the authname on an SSL structure, SSL* ssl */
128425039b37SCy Schubert int set_auth_name_on_ssl(void* ssl, char* auth_name, int use_sni)
128525039b37SCy Schubert {
128625039b37SCy Schubert 	if(!auth_name) return 1;
128725039b37SCy Schubert #ifdef HAVE_SSL
128825039b37SCy Schubert 	if(use_sni) {
128925039b37SCy Schubert 		(void)SSL_set_tlsext_host_name(ssl, auth_name);
129025039b37SCy Schubert 	}
129125039b37SCy Schubert #else
129225039b37SCy Schubert 	(void)ssl;
129325039b37SCy Schubert 	(void)use_sni;
129425039b37SCy Schubert #endif
129525039b37SCy Schubert #ifdef HAVE_SSL_SET1_HOST
129625039b37SCy Schubert 	SSL_set_verify(ssl, SSL_VERIFY_PEER, NULL);
129725039b37SCy Schubert 	/* setting the hostname makes openssl verify the
129825039b37SCy Schubert 	 * host name in the x509 certificate in the
129925039b37SCy Schubert 	 * SSL connection*/
130025039b37SCy Schubert 	if(!SSL_set1_host(ssl, auth_name)) {
130125039b37SCy Schubert 		log_err("SSL_set1_host failed");
130225039b37SCy Schubert 		return 0;
130325039b37SCy Schubert 	}
130425039b37SCy Schubert #elif defined(HAVE_X509_VERIFY_PARAM_SET1_HOST)
130525039b37SCy Schubert 	/* openssl 1.0.2 has this function that can be used for
130625039b37SCy Schubert 	 * set1_host like verification */
130725039b37SCy Schubert 	if(auth_name) {
130825039b37SCy Schubert 		X509_VERIFY_PARAM* param = SSL_get0_param(ssl);
130925039b37SCy Schubert #  ifdef X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS
131025039b37SCy Schubert 		X509_VERIFY_PARAM_set_hostflags(param, X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS);
131125039b37SCy Schubert #  endif
131225039b37SCy Schubert 		if(!X509_VERIFY_PARAM_set1_host(param, auth_name, strlen(auth_name))) {
131325039b37SCy Schubert 			log_err("X509_VERIFY_PARAM_set1_host failed");
131425039b37SCy Schubert 			return 0;
131525039b37SCy Schubert 		}
131625039b37SCy Schubert 		SSL_set_verify(ssl, SSL_VERIFY_PEER, NULL);
131725039b37SCy Schubert 	}
131825039b37SCy Schubert #else
131925039b37SCy Schubert 	verbose(VERB_ALGO, "the query has an auth_name, but libssl has no call to perform TLS authentication");
132025039b37SCy Schubert #endif /* HAVE_SSL_SET1_HOST */
132125039b37SCy Schubert 	return 1;
132225039b37SCy Schubert }
132325039b37SCy Schubert 
1324b5663de9SDag-Erling Smørgrav #if defined(HAVE_SSL) && defined(OPENSSL_THREADS) && !defined(THREADS_DISABLED) && defined(CRYPTO_LOCK) && OPENSSL_VERSION_NUMBER < 0x10100000L
13258ed2b524SDag-Erling Smørgrav /** global lock list for openssl locks */
13263005e0a3SDag-Erling Smørgrav static lock_basic_type *ub_openssl_locks = NULL;
13278ed2b524SDag-Erling Smørgrav 
13288ed2b524SDag-Erling Smørgrav /** callback that gets thread id for openssl */
1329e86b9096SDag-Erling Smørgrav #ifdef HAVE_CRYPTO_THREADID_SET_CALLBACK
1330e86b9096SDag-Erling Smørgrav static void
1331e86b9096SDag-Erling Smørgrav ub_crypto_id_cb(CRYPTO_THREADID *id)
1332e86b9096SDag-Erling Smørgrav {
1333e86b9096SDag-Erling Smørgrav 	CRYPTO_THREADID_set_numeric(id, (unsigned long)log_thread_get());
1334e86b9096SDag-Erling Smørgrav }
1335e86b9096SDag-Erling Smørgrav #else
13368ed2b524SDag-Erling Smørgrav static unsigned long
13378ed2b524SDag-Erling Smørgrav ub_crypto_id_cb(void)
13388ed2b524SDag-Erling Smørgrav {
133909a3aaf3SDag-Erling Smørgrav 	return (unsigned long)log_thread_get();
13408ed2b524SDag-Erling Smørgrav }
1341e86b9096SDag-Erling Smørgrav #endif
13428ed2b524SDag-Erling Smørgrav 
13438ed2b524SDag-Erling Smørgrav static void
13448ed2b524SDag-Erling Smørgrav ub_crypto_lock_cb(int mode, int type, const char *ATTR_UNUSED(file),
13458ed2b524SDag-Erling Smørgrav 	int ATTR_UNUSED(line))
13468ed2b524SDag-Erling Smørgrav {
13478ed2b524SDag-Erling Smørgrav 	if((mode&CRYPTO_LOCK)) {
13488ed2b524SDag-Erling Smørgrav 		lock_basic_lock(&ub_openssl_locks[type]);
13498ed2b524SDag-Erling Smørgrav 	} else {
13508ed2b524SDag-Erling Smørgrav 		lock_basic_unlock(&ub_openssl_locks[type]);
13518ed2b524SDag-Erling Smørgrav 	}
13528ed2b524SDag-Erling Smørgrav }
13538ed2b524SDag-Erling Smørgrav #endif /* OPENSSL_THREADS */
13548ed2b524SDag-Erling Smørgrav 
13558ed2b524SDag-Erling Smørgrav int ub_openssl_lock_init(void)
13568ed2b524SDag-Erling Smørgrav {
1357b5663de9SDag-Erling Smørgrav #if defined(HAVE_SSL) && defined(OPENSSL_THREADS) && !defined(THREADS_DISABLED) && defined(CRYPTO_LOCK) && OPENSSL_VERSION_NUMBER < 0x10100000L
13588ed2b524SDag-Erling Smørgrav 	int i;
13593005e0a3SDag-Erling Smørgrav 	ub_openssl_locks = (lock_basic_type*)reallocarray(
13603005e0a3SDag-Erling Smørgrav 		NULL, (size_t)CRYPTO_num_locks(), sizeof(lock_basic_type));
13618ed2b524SDag-Erling Smørgrav 	if(!ub_openssl_locks)
13628ed2b524SDag-Erling Smørgrav 		return 0;
13638ed2b524SDag-Erling Smørgrav 	for(i=0; i<CRYPTO_num_locks(); i++) {
13648ed2b524SDag-Erling Smørgrav 		lock_basic_init(&ub_openssl_locks[i]);
13658ed2b524SDag-Erling Smørgrav 	}
1366e86b9096SDag-Erling Smørgrav #  ifdef HAVE_CRYPTO_THREADID_SET_CALLBACK
1367e86b9096SDag-Erling Smørgrav 	CRYPTO_THREADID_set_callback(&ub_crypto_id_cb);
1368e86b9096SDag-Erling Smørgrav #  else
13698ed2b524SDag-Erling Smørgrav 	CRYPTO_set_id_callback(&ub_crypto_id_cb);
1370e86b9096SDag-Erling Smørgrav #  endif
13718ed2b524SDag-Erling Smørgrav 	CRYPTO_set_locking_callback(&ub_crypto_lock_cb);
13728ed2b524SDag-Erling Smørgrav #endif /* OPENSSL_THREADS */
13738ed2b524SDag-Erling Smørgrav 	return 1;
13748ed2b524SDag-Erling Smørgrav }
13758ed2b524SDag-Erling Smørgrav 
13768ed2b524SDag-Erling Smørgrav void ub_openssl_lock_delete(void)
13778ed2b524SDag-Erling Smørgrav {
1378b5663de9SDag-Erling Smørgrav #if defined(HAVE_SSL) && defined(OPENSSL_THREADS) && !defined(THREADS_DISABLED) && defined(CRYPTO_LOCK) && OPENSSL_VERSION_NUMBER < 0x10100000L
13798ed2b524SDag-Erling Smørgrav 	int i;
13808ed2b524SDag-Erling Smørgrav 	if(!ub_openssl_locks)
13818ed2b524SDag-Erling Smørgrav 		return;
1382e86b9096SDag-Erling Smørgrav #  ifdef HAVE_CRYPTO_THREADID_SET_CALLBACK
1383e86b9096SDag-Erling Smørgrav 	CRYPTO_THREADID_set_callback(NULL);
1384e86b9096SDag-Erling Smørgrav #  else
13858ed2b524SDag-Erling Smørgrav 	CRYPTO_set_id_callback(NULL);
1386e86b9096SDag-Erling Smørgrav #  endif
13878ed2b524SDag-Erling Smørgrav 	CRYPTO_set_locking_callback(NULL);
13888ed2b524SDag-Erling Smørgrav 	for(i=0; i<CRYPTO_num_locks(); i++) {
13898ed2b524SDag-Erling Smørgrav 		lock_basic_destroy(&ub_openssl_locks[i]);
13908ed2b524SDag-Erling Smørgrav 	}
13918ed2b524SDag-Erling Smørgrav 	free(ub_openssl_locks);
13928ed2b524SDag-Erling Smørgrav #endif /* OPENSSL_THREADS */
13938ed2b524SDag-Erling Smørgrav }
13948ed2b524SDag-Erling Smørgrav 
1395e86b9096SDag-Erling Smørgrav int listen_sslctx_setup_ticket_keys(void* sslctx, struct config_strlist* tls_session_ticket_keys) {
1396e86b9096SDag-Erling Smørgrav #ifdef HAVE_SSL
1397e86b9096SDag-Erling Smørgrav 	size_t s = 1;
1398e86b9096SDag-Erling Smørgrav 	struct config_strlist* p;
1399e86b9096SDag-Erling Smørgrav 	struct tls_session_ticket_key *keys;
1400e86b9096SDag-Erling Smørgrav 	for(p = tls_session_ticket_keys; p; p = p->next) {
1401e86b9096SDag-Erling Smørgrav 		s++;
1402e86b9096SDag-Erling Smørgrav 	}
1403e86b9096SDag-Erling Smørgrav 	keys = calloc(s, sizeof(struct tls_session_ticket_key));
1404091e9e46SCy Schubert 	if(!keys)
1405091e9e46SCy Schubert 		return 0;
1406e86b9096SDag-Erling Smørgrav 	memset(keys, 0, s*sizeof(*keys));
1407e86b9096SDag-Erling Smørgrav 	ticket_keys = keys;
1408e86b9096SDag-Erling Smørgrav 
1409e86b9096SDag-Erling Smørgrav 	for(p = tls_session_ticket_keys; p; p = p->next) {
1410e86b9096SDag-Erling Smørgrav 		size_t n;
1411091e9e46SCy Schubert 		unsigned char *data;
1412091e9e46SCy Schubert 		FILE *f;
1413091e9e46SCy Schubert 
1414091e9e46SCy Schubert 		data = (unsigned char *)malloc(80);
1415091e9e46SCy Schubert 		if(!data)
1416091e9e46SCy Schubert 			return 0;
1417091e9e46SCy Schubert 
141825039b37SCy Schubert 		f = fopen(p->str, "rb");
1419e86b9096SDag-Erling Smørgrav 		if(!f) {
1420e86b9096SDag-Erling Smørgrav 			log_err("could not read tls-session-ticket-key %s: %s", p->str, strerror(errno));
1421e86b9096SDag-Erling Smørgrav 			free(data);
1422e86b9096SDag-Erling Smørgrav 			return 0;
1423e86b9096SDag-Erling Smørgrav 		}
1424e86b9096SDag-Erling Smørgrav 		n = fread(data, 1, 80, f);
1425e86b9096SDag-Erling Smørgrav 		fclose(f);
1426e86b9096SDag-Erling Smørgrav 
1427e86b9096SDag-Erling Smørgrav 		if(n != 80) {
1428e86b9096SDag-Erling Smørgrav 			log_err("tls-session-ticket-key %s is %d bytes, must be 80 bytes", p->str, (int)n);
1429e86b9096SDag-Erling Smørgrav 			free(data);
1430e86b9096SDag-Erling Smørgrav 			return 0;
1431e86b9096SDag-Erling Smørgrav 		}
1432e86b9096SDag-Erling Smørgrav 		verbose(VERB_OPS, "read tls-session-ticket-key: %s", p->str);
1433e86b9096SDag-Erling Smørgrav 
1434e86b9096SDag-Erling Smørgrav 		keys->key_name = data;
1435e86b9096SDag-Erling Smørgrav 		keys->aes_key = data + 16;
1436e86b9096SDag-Erling Smørgrav 		keys->hmac_key = data + 48;
1437e86b9096SDag-Erling Smørgrav 		keys++;
1438e86b9096SDag-Erling Smørgrav 	}
1439e86b9096SDag-Erling Smørgrav 	/* terminate array with NULL key name entry */
1440e86b9096SDag-Erling Smørgrav 	keys->key_name = NULL;
144125039b37SCy Schubert #  ifdef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB
144225039b37SCy Schubert 	if(SSL_CTX_set_tlsext_ticket_key_evp_cb(sslctx, tls_session_ticket_key_cb) == 0) {
144325039b37SCy Schubert 		log_err("no support for TLS session ticket");
144425039b37SCy Schubert 		return 0;
144525039b37SCy Schubert 	}
144625039b37SCy Schubert #  else
1447e86b9096SDag-Erling Smørgrav 	if(SSL_CTX_set_tlsext_ticket_key_cb(sslctx, tls_session_ticket_key_cb) == 0) {
1448e86b9096SDag-Erling Smørgrav 		log_err("no support for TLS session ticket");
1449e86b9096SDag-Erling Smørgrav 		return 0;
1450e86b9096SDag-Erling Smørgrav 	}
145125039b37SCy Schubert #  endif
1452e86b9096SDag-Erling Smørgrav 	return 1;
1453e86b9096SDag-Erling Smørgrav #else
1454e86b9096SDag-Erling Smørgrav 	(void)sslctx;
1455e86b9096SDag-Erling Smørgrav 	(void)tls_session_ticket_keys;
1456e86b9096SDag-Erling Smørgrav 	return 0;
1457e86b9096SDag-Erling Smørgrav #endif
1458e86b9096SDag-Erling Smørgrav 
1459e86b9096SDag-Erling Smørgrav }
1460e86b9096SDag-Erling Smørgrav 
146125039b37SCy Schubert #ifdef HAVE_SSL
146225039b37SCy Schubert int tls_session_ticket_key_cb(SSL *ATTR_UNUSED(sslctx), unsigned char* key_name,
146325039b37SCy Schubert 	unsigned char* iv, EVP_CIPHER_CTX *evp_sctx,
146425039b37SCy Schubert #ifdef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB
146525039b37SCy Schubert 	EVP_MAC_CTX *hmac_ctx,
146625039b37SCy Schubert #else
146725039b37SCy Schubert 	HMAC_CTX* hmac_ctx,
146825039b37SCy Schubert #endif
146925039b37SCy Schubert 	int enc)
1470e86b9096SDag-Erling Smørgrav {
1471e86b9096SDag-Erling Smørgrav #ifdef HAVE_SSL
147225039b37SCy Schubert #  ifdef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB
147325039b37SCy Schubert 	OSSL_PARAM params[3];
147425039b37SCy Schubert #  else
1475e86b9096SDag-Erling Smørgrav 	const EVP_MD *digest;
147625039b37SCy Schubert #  endif
1477e86b9096SDag-Erling Smørgrav 	const EVP_CIPHER *cipher;
1478e86b9096SDag-Erling Smørgrav 	int evp_cipher_length;
147925039b37SCy Schubert #  ifndef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB
1480e86b9096SDag-Erling Smørgrav 	digest = EVP_sha256();
148125039b37SCy Schubert #  endif
1482e86b9096SDag-Erling Smørgrav 	cipher = EVP_aes_256_cbc();
1483e86b9096SDag-Erling Smørgrav 	evp_cipher_length = EVP_CIPHER_iv_length(cipher);
1484e86b9096SDag-Erling Smørgrav 	if( enc == 1 ) {
1485e86b9096SDag-Erling Smørgrav 		/* encrypt */
1486e86b9096SDag-Erling Smørgrav 		verbose(VERB_CLIENT, "start session encrypt");
1487e86b9096SDag-Erling Smørgrav 		memcpy(key_name, ticket_keys->key_name, 16);
1488e86b9096SDag-Erling Smørgrav 		if (RAND_bytes(iv, evp_cipher_length) != 1) {
1489e86b9096SDag-Erling Smørgrav 			verbose(VERB_CLIENT, "RAND_bytes failed");
1490e86b9096SDag-Erling Smørgrav 			return -1;
1491e86b9096SDag-Erling Smørgrav 		}
1492e86b9096SDag-Erling Smørgrav 		if (EVP_EncryptInit_ex(evp_sctx, cipher, NULL, ticket_keys->aes_key, iv) != 1) {
1493e86b9096SDag-Erling Smørgrav 			verbose(VERB_CLIENT, "EVP_EncryptInit_ex failed");
1494e86b9096SDag-Erling Smørgrav 			return -1;
1495e86b9096SDag-Erling Smørgrav 		}
149625039b37SCy Schubert #ifdef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB
149725039b37SCy Schubert 		params[0] = OSSL_PARAM_construct_octet_string(OSSL_MAC_PARAM_KEY,
149825039b37SCy Schubert 			ticket_keys->hmac_key, 32);
149925039b37SCy Schubert 		params[1] = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_DIGEST,
150025039b37SCy Schubert 			"sha256", 0);
150125039b37SCy Schubert 		params[2] = OSSL_PARAM_construct_end();
1502*c0caa2e2SCy Schubert #ifdef HAVE_EVP_MAC_CTX_SET_PARAMS
1503*c0caa2e2SCy Schubert 		EVP_MAC_CTX_set_params(hmac_ctx, params);
1504*c0caa2e2SCy Schubert #else
150525039b37SCy Schubert 		EVP_MAC_set_ctx_params(hmac_ctx, params);
1506*c0caa2e2SCy Schubert #endif
150725039b37SCy Schubert #elif !defined(HMAC_INIT_EX_RETURNS_VOID)
1508e86b9096SDag-Erling Smørgrav 		if (HMAC_Init_ex(hmac_ctx, ticket_keys->hmac_key, 32, digest, NULL) != 1) {
1509e86b9096SDag-Erling Smørgrav 			verbose(VERB_CLIENT, "HMAC_Init_ex failed");
1510e86b9096SDag-Erling Smørgrav 			return -1;
1511e86b9096SDag-Erling Smørgrav 		}
15120eefd307SCy Schubert #else
15130eefd307SCy Schubert 		HMAC_Init_ex(hmac_ctx, ticket_keys->hmac_key, 32, digest, NULL);
15140eefd307SCy Schubert #endif
1515e86b9096SDag-Erling Smørgrav 		return 1;
1516e86b9096SDag-Erling Smørgrav 	} else if (enc == 0) {
1517e86b9096SDag-Erling Smørgrav 		/* decrypt */
1518e86b9096SDag-Erling Smørgrav 		struct tls_session_ticket_key *key;
1519e86b9096SDag-Erling Smørgrav 		verbose(VERB_CLIENT, "start session decrypt");
1520e86b9096SDag-Erling Smørgrav 		for(key = ticket_keys; key->key_name != NULL; key++) {
1521e86b9096SDag-Erling Smørgrav 			if (!memcmp(key_name, key->key_name, 16)) {
1522e86b9096SDag-Erling Smørgrav 				verbose(VERB_CLIENT, "Found session_key");
1523e86b9096SDag-Erling Smørgrav 				break;
1524e86b9096SDag-Erling Smørgrav 			}
1525e86b9096SDag-Erling Smørgrav 		}
1526e86b9096SDag-Erling Smørgrav 		if(key->key_name == NULL) {
1527e86b9096SDag-Erling Smørgrav 			verbose(VERB_CLIENT, "Not found session_key");
1528e86b9096SDag-Erling Smørgrav 			return 0;
1529e86b9096SDag-Erling Smørgrav 		}
1530e86b9096SDag-Erling Smørgrav 
153125039b37SCy Schubert #ifdef HAVE_SSL_CTX_SET_TLSEXT_TICKET_KEY_EVP_CB
153225039b37SCy Schubert 		params[0] = OSSL_PARAM_construct_octet_string(OSSL_KDF_PARAM_KEY,
153325039b37SCy Schubert 			key->hmac_key, 32);
153425039b37SCy Schubert 		params[1] = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_DIGEST,
153525039b37SCy Schubert 			"sha256", 0);
153625039b37SCy Schubert 		params[2] = OSSL_PARAM_construct_end();
1537*c0caa2e2SCy Schubert #ifdef HAVE_EVP_MAC_CTX_SET_PARAMS
1538*c0caa2e2SCy Schubert 		EVP_MAC_CTX_set_params(hmac_ctx, params);
1539*c0caa2e2SCy Schubert #else
154025039b37SCy Schubert 		EVP_MAC_set_ctx_params(hmac_ctx, params);
1541*c0caa2e2SCy Schubert #endif
154225039b37SCy Schubert #elif !defined(HMAC_INIT_EX_RETURNS_VOID)
1543e86b9096SDag-Erling Smørgrav 		if (HMAC_Init_ex(hmac_ctx, key->hmac_key, 32, digest, NULL) != 1) {
1544e86b9096SDag-Erling Smørgrav 			verbose(VERB_CLIENT, "HMAC_Init_ex failed");
1545e86b9096SDag-Erling Smørgrav 			return -1;
1546e86b9096SDag-Erling Smørgrav 		}
15470eefd307SCy Schubert #else
15480eefd307SCy Schubert 		HMAC_Init_ex(hmac_ctx, key->hmac_key, 32, digest, NULL);
15490eefd307SCy Schubert #endif
1550e86b9096SDag-Erling Smørgrav 		if (EVP_DecryptInit_ex(evp_sctx, cipher, NULL, key->aes_key, iv) != 1) {
1551e86b9096SDag-Erling Smørgrav 			log_err("EVP_DecryptInit_ex failed");
1552e86b9096SDag-Erling Smørgrav 			return -1;
1553e86b9096SDag-Erling Smørgrav 		}
1554e86b9096SDag-Erling Smørgrav 
1555e86b9096SDag-Erling Smørgrav 		return (key == ticket_keys) ? 1 : 2;
1556e86b9096SDag-Erling Smørgrav 	}
1557e86b9096SDag-Erling Smørgrav 	return -1;
1558e86b9096SDag-Erling Smørgrav #else
1559e86b9096SDag-Erling Smørgrav 	(void)key_name;
1560e86b9096SDag-Erling Smørgrav 	(void)iv;
1561e86b9096SDag-Erling Smørgrav 	(void)evp_sctx;
1562e86b9096SDag-Erling Smørgrav 	(void)hmac_ctx;
1563e86b9096SDag-Erling Smørgrav 	(void)enc;
1564e86b9096SDag-Erling Smørgrav 	return 0;
1565e86b9096SDag-Erling Smørgrav #endif
1566e86b9096SDag-Erling Smørgrav }
156725039b37SCy Schubert #endif /* HAVE_SSL */
1568e86b9096SDag-Erling Smørgrav 
1569e86b9096SDag-Erling Smørgrav void
1570e86b9096SDag-Erling Smørgrav listen_sslctx_delete_ticket_keys(void)
1571e86b9096SDag-Erling Smørgrav {
1572e86b9096SDag-Erling Smørgrav 	struct tls_session_ticket_key *key;
1573e86b9096SDag-Erling Smørgrav 	if(!ticket_keys) return;
1574e86b9096SDag-Erling Smørgrav 	for(key = ticket_keys; key->key_name != NULL; key++) {
1575e86b9096SDag-Erling Smørgrav 		/* wipe key data from memory*/
1576e86b9096SDag-Erling Smørgrav #ifdef HAVE_EXPLICIT_BZERO
1577e86b9096SDag-Erling Smørgrav 		explicit_bzero(key->key_name, 80);
1578e86b9096SDag-Erling Smørgrav #else
1579e86b9096SDag-Erling Smørgrav 		memset(key->key_name, 0xdd, 80);
1580e86b9096SDag-Erling Smørgrav #endif
1581e86b9096SDag-Erling Smørgrav 		free(key->key_name);
1582e86b9096SDag-Erling Smørgrav 	}
1583e86b9096SDag-Erling Smørgrav 	free(ticket_keys);
1584e86b9096SDag-Erling Smørgrav 	ticket_keys = NULL;
1585e86b9096SDag-Erling Smørgrav }
1586*c0caa2e2SCy Schubert 
1587*c0caa2e2SCy Schubert #  ifndef USE_WINSOCK
1588*c0caa2e2SCy Schubert char*
1589*c0caa2e2SCy Schubert sock_strerror(int errn)
1590*c0caa2e2SCy Schubert {
1591*c0caa2e2SCy Schubert 	return strerror(errn);
1592*c0caa2e2SCy Schubert }
1593*c0caa2e2SCy Schubert 
1594*c0caa2e2SCy Schubert void
1595*c0caa2e2SCy Schubert sock_close(int socket)
1596*c0caa2e2SCy Schubert {
1597*c0caa2e2SCy Schubert 	close(socket);
1598*c0caa2e2SCy Schubert }
1599*c0caa2e2SCy Schubert 
1600*c0caa2e2SCy Schubert #  else
1601*c0caa2e2SCy Schubert char*
1602*c0caa2e2SCy Schubert sock_strerror(int ATTR_UNUSED(errn))
1603*c0caa2e2SCy Schubert {
1604*c0caa2e2SCy Schubert 	return wsa_strerror(WSAGetLastError());
1605*c0caa2e2SCy Schubert }
1606*c0caa2e2SCy Schubert 
1607*c0caa2e2SCy Schubert void
1608*c0caa2e2SCy Schubert sock_close(int socket)
1609*c0caa2e2SCy Schubert {
1610*c0caa2e2SCy Schubert 	closesocket(socket);
1611*c0caa2e2SCy Schubert }
1612*c0caa2e2SCy Schubert 
1613*c0caa2e2SCy Schubert #  endif /* USE_WINSOCK */
1614