Home | History | Annotate | Download | only in vtls
      1 #ifndef HEADER_CURL_VTLS_H
      2 #define HEADER_CURL_VTLS_H
      3 /***************************************************************************
      4  *                                  _   _ ____  _
      5  *  Project                     ___| | | |  _ \| |
      6  *                             / __| | | | |_) | |
      7  *                            | (__| |_| |  _ <| |___
      8  *                             \___|\___/|_| \_\_____|
      9  *
     10  * Copyright (C) 1998 - 2019, Daniel Stenberg, <daniel (at) haxx.se>, et al.
     11  *
     12  * This software is licensed as described in the file COPYING, which
     13  * you should have received as part of this distribution. The terms
     14  * are also available at https://curl.haxx.se/docs/copyright.html.
     15  *
     16  * You may opt to use, copy, modify, merge, publish, distribute and/or sell
     17  * copies of the Software, and permit persons to whom the Software is
     18  * furnished to do so, under the terms of the COPYING file.
     19  *
     20  * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
     21  * KIND, either express or implied.
     22  *
     23  ***************************************************************************/
     24 #include "curl_setup.h"
     25 
     26 struct connectdata;
     27 struct ssl_connect_data;
     28 
     29 #define SSLSUPP_CA_PATH      (1<<0) /* supports CAPATH */
     30 #define SSLSUPP_CERTINFO     (1<<1) /* supports CURLOPT_CERTINFO */
     31 #define SSLSUPP_PINNEDPUBKEY (1<<2) /* supports CURLOPT_PINNEDPUBLICKEY */
     32 #define SSLSUPP_SSL_CTX      (1<<3) /* supports CURLOPT_SSL_CTX */
     33 #define SSLSUPP_HTTPS_PROXY  (1<<4) /* supports access via HTTPS proxies */
     34 #define SSLSUPP_TLS13_CIPHERSUITES (1<<5) /* supports TLS 1.3 ciphersuites */
     35 
     36 struct Curl_ssl {
     37   /*
     38    * This *must* be the first entry to allow returning the list of available
     39    * backends in curl_global_sslset().
     40    */
     41   curl_ssl_backend info;
     42   unsigned int supports; /* bitfield, see above */
     43   size_t sizeof_ssl_backend_data;
     44 
     45   int (*init)(void);
     46   void (*cleanup)(void);
     47 
     48   size_t (*version)(char *buffer, size_t size);
     49   int (*check_cxn)(struct connectdata *cxn);
     50   int (*shut_down)(struct connectdata *conn, int sockindex);
     51   bool (*data_pending)(const struct connectdata *conn,
     52                        int connindex);
     53 
     54   /* return 0 if a find random is filled in */
     55   CURLcode (*random)(struct Curl_easy *data, unsigned char *entropy,
     56                      size_t length);
     57   bool (*cert_status_request)(void);
     58 
     59   CURLcode (*connect_blocking)(struct connectdata *conn, int sockindex);
     60   CURLcode (*connect_nonblocking)(struct connectdata *conn, int sockindex,
     61                                   bool *done);
     62   void *(*get_internals)(struct ssl_connect_data *connssl, CURLINFO info);
     63   void (*close_one)(struct connectdata *conn, int sockindex);
     64   void (*close_all)(struct Curl_easy *data);
     65   void (*session_free)(void *ptr);
     66 
     67   CURLcode (*set_engine)(struct Curl_easy *data, const char *engine);
     68   CURLcode (*set_engine_default)(struct Curl_easy *data);
     69   struct curl_slist *(*engines_list)(struct Curl_easy *data);
     70 
     71   bool (*false_start)(void);
     72 
     73   CURLcode (*md5sum)(unsigned char *input, size_t inputlen,
     74                      unsigned char *md5sum, size_t md5sumlen);
     75   CURLcode (*sha256sum)(const unsigned char *input, size_t inputlen,
     76                     unsigned char *sha256sum, size_t sha256sumlen);
     77 };
     78 
     79 #ifdef USE_SSL
     80 extern const struct Curl_ssl *Curl_ssl;
     81 #endif
     82 
     83 int Curl_none_init(void);
     84 void Curl_none_cleanup(void);
     85 int Curl_none_shutdown(struct connectdata *conn, int sockindex);
     86 int Curl_none_check_cxn(struct connectdata *conn);
     87 CURLcode Curl_none_random(struct Curl_easy *data, unsigned char *entropy,
     88                           size_t length);
     89 void Curl_none_close_all(struct Curl_easy *data);
     90 void Curl_none_session_free(void *ptr);
     91 bool Curl_none_data_pending(const struct connectdata *conn, int connindex);
     92 bool Curl_none_cert_status_request(void);
     93 CURLcode Curl_none_set_engine(struct Curl_easy *data, const char *engine);
     94 CURLcode Curl_none_set_engine_default(struct Curl_easy *data);
     95 struct curl_slist *Curl_none_engines_list(struct Curl_easy *data);
     96 bool Curl_none_false_start(void);
     97 bool Curl_ssl_tls13_ciphersuites(void);
     98 CURLcode Curl_none_md5sum(unsigned char *input, size_t inputlen,
     99                           unsigned char *md5sum, size_t md5len);
    100 
    101 #include "openssl.h"        /* OpenSSL versions */
    102 #include "gtls.h"           /* GnuTLS versions */
    103 #include "nssg.h"           /* NSS versions */
    104 #include "gskit.h"          /* Global Secure ToolKit versions */
    105 #include "polarssl.h"       /* PolarSSL versions */
    106 #include "cyassl.h"         /* CyaSSL versions */
    107 #include "schannel.h"       /* Schannel SSPI version */
    108 #include "sectransp.h"      /* SecureTransport (Darwin) version */
    109 #include "mbedtls.h"        /* mbedTLS versions */
    110 #include "mesalink.h"       /* MesaLink versions */
    111 
    112 #ifndef MAX_PINNED_PUBKEY_SIZE
    113 #define MAX_PINNED_PUBKEY_SIZE 1048576 /* 1MB */
    114 #endif
    115 
    116 #ifndef MD5_DIGEST_LENGTH
    117 #ifndef LIBWOLFSSL_VERSION_HEX /* because WolfSSL borks this */
    118 #define MD5_DIGEST_LENGTH 16 /* fixed size */
    119 #endif
    120 #endif
    121 
    122 #ifndef CURL_SHA256_DIGEST_LENGTH
    123 #define CURL_SHA256_DIGEST_LENGTH 32 /* fixed size */
    124 #endif
    125 
    126 /* see https://tools.ietf.org/html/draft-ietf-tls-applayerprotoneg-04 */
    127 #define ALPN_HTTP_1_1_LENGTH 8
    128 #define ALPN_HTTP_1_1 "http/1.1"
    129 
    130 /* set of helper macros for the backends to access the correct fields. For the
    131    proxy or for the remote host - to properly support HTTPS proxy */
    132 
    133 #define SSL_IS_PROXY() (CURLPROXY_HTTPS == conn->http_proxy.proxytype && \
    134   ssl_connection_complete != conn->proxy_ssl[conn->sock[SECONDARYSOCKET] == \
    135   CURL_SOCKET_BAD ? FIRSTSOCKET : SECONDARYSOCKET].state)
    136 #define SSL_SET_OPTION(var) (SSL_IS_PROXY() ? data->set.proxy_ssl.var : \
    137                              data->set.ssl.var)
    138 #define SSL_CONN_CONFIG(var) (SSL_IS_PROXY() ?          \
    139   conn->proxy_ssl_config.var : conn->ssl_config.var)
    140 
    141 bool Curl_ssl_config_matches(struct ssl_primary_config* data,
    142                              struct ssl_primary_config* needle);
    143 bool Curl_clone_primary_ssl_config(struct ssl_primary_config *source,
    144                                    struct ssl_primary_config *dest);
    145 void Curl_free_primary_ssl_config(struct ssl_primary_config* sslc);
    146 int Curl_ssl_getsock(struct connectdata *conn, curl_socket_t *socks,
    147                      int numsocks);
    148 
    149 int Curl_ssl_backend(void);
    150 
    151 #ifdef USE_SSL
    152 int Curl_ssl_init(void);
    153 void Curl_ssl_cleanup(void);
    154 CURLcode Curl_ssl_connect(struct connectdata *conn, int sockindex);
    155 CURLcode Curl_ssl_connect_nonblocking(struct connectdata *conn,
    156                                       int sockindex,
    157                                       bool *done);
    158 /* tell the SSL stuff to close down all open information regarding
    159    connections (and thus session ID caching etc) */
    160 void Curl_ssl_close_all(struct Curl_easy *data);
    161 void Curl_ssl_close(struct connectdata *conn, int sockindex);
    162 CURLcode Curl_ssl_shutdown(struct connectdata *conn, int sockindex);
    163 CURLcode Curl_ssl_set_engine(struct Curl_easy *data, const char *engine);
    164 /* Sets engine as default for all SSL operations */
    165 CURLcode Curl_ssl_set_engine_default(struct Curl_easy *data);
    166 struct curl_slist *Curl_ssl_engines_list(struct Curl_easy *data);
    167 
    168 /* init the SSL session ID cache */
    169 CURLcode Curl_ssl_initsessions(struct Curl_easy *, size_t);
    170 size_t Curl_ssl_version(char *buffer, size_t size);
    171 bool Curl_ssl_data_pending(const struct connectdata *conn,
    172                            int connindex);
    173 int Curl_ssl_check_cxn(struct connectdata *conn);
    174 
    175 /* Certificate information list handling. */
    176 
    177 void Curl_ssl_free_certinfo(struct Curl_easy *data);
    178 CURLcode Curl_ssl_init_certinfo(struct Curl_easy *data, int num);
    179 CURLcode Curl_ssl_push_certinfo_len(struct Curl_easy *data, int certnum,
    180                                     const char *label, const char *value,
    181                                     size_t valuelen);
    182 CURLcode Curl_ssl_push_certinfo(struct Curl_easy *data, int certnum,
    183                                 const char *label, const char *value);
    184 
    185 /* Functions to be used by SSL library adaptation functions */
    186 
    187 /* Lock session cache mutex.
    188  * Call this before calling other Curl_ssl_*session* functions
    189  * Caller should unlock this mutex as soon as possible, as it may block
    190  * other SSL connection from making progress.
    191  * The purpose of explicitly locking SSL session cache data is to allow
    192  * individual SSL engines to manage session lifetime in their specific way.
    193  */
    194 void Curl_ssl_sessionid_lock(struct connectdata *conn);
    195 
    196 /* Unlock session cache mutex */
    197 void Curl_ssl_sessionid_unlock(struct connectdata *conn);
    198 
    199 /* extract a session ID
    200  * Sessionid mutex must be locked (see Curl_ssl_sessionid_lock).
    201  * Caller must make sure that the ownership of returned sessionid object
    202  * is properly taken (e.g. its refcount is incremented
    203  * under sessionid mutex).
    204  */
    205 bool Curl_ssl_getsessionid(struct connectdata *conn,
    206                            void **ssl_sessionid,
    207                            size_t *idsize, /* set 0 if unknown */
    208                            int sockindex);
    209 /* add a new session ID
    210  * Sessionid mutex must be locked (see Curl_ssl_sessionid_lock).
    211  * Caller must ensure that it has properly shared ownership of this sessionid
    212  * object with cache (e.g. incrementing refcount on success)
    213  */
    214 CURLcode Curl_ssl_addsessionid(struct connectdata *conn,
    215                                void *ssl_sessionid,
    216                                size_t idsize,
    217                                int sockindex);
    218 /* Kill a single session ID entry in the cache
    219  * Sessionid mutex must be locked (see Curl_ssl_sessionid_lock).
    220  * This will call engine-specific curlssl_session_free function, which must
    221  * take sessionid object ownership from sessionid cache
    222  * (e.g. decrement refcount).
    223  */
    224 void Curl_ssl_kill_session(struct curl_ssl_session *session);
    225 /* delete a session from the cache
    226  * Sessionid mutex must be locked (see Curl_ssl_sessionid_lock).
    227  * This will call engine-specific curlssl_session_free function, which must
    228  * take sessionid object ownership from sessionid cache
    229  * (e.g. decrement refcount).
    230  */
    231 void Curl_ssl_delsessionid(struct connectdata *conn, void *ssl_sessionid);
    232 
    233 /* get N random bytes into the buffer */
    234 CURLcode Curl_ssl_random(struct Curl_easy *data, unsigned char *buffer,
    235                          size_t length);
    236 CURLcode Curl_ssl_md5sum(unsigned char *tmp, /* input */
    237                          size_t tmplen,
    238                          unsigned char *md5sum, /* output */
    239                          size_t md5len);
    240 /* Check pinned public key. */
    241 CURLcode Curl_pin_peer_pubkey(struct Curl_easy *data,
    242                               const char *pinnedpubkey,
    243                               const unsigned char *pubkey, size_t pubkeylen);
    244 
    245 bool Curl_ssl_cert_status_request(void);
    246 
    247 bool Curl_ssl_false_start(void);
    248 
    249 #define SSL_SHUTDOWN_TIMEOUT 10000 /* ms */
    250 
    251 #else /* if not USE_SSL */
    252 
    253 /* When SSL support is not present, just define away these function calls */
    254 #define Curl_ssl_init() 1
    255 #define Curl_ssl_cleanup() Curl_nop_stmt
    256 #define Curl_ssl_connect(x,y) CURLE_NOT_BUILT_IN
    257 #define Curl_ssl_close_all(x) Curl_nop_stmt
    258 #define Curl_ssl_close(x,y) Curl_nop_stmt
    259 #define Curl_ssl_shutdown(x,y) CURLE_NOT_BUILT_IN
    260 #define Curl_ssl_set_engine(x,y) CURLE_NOT_BUILT_IN
    261 #define Curl_ssl_set_engine_default(x) CURLE_NOT_BUILT_IN
    262 #define Curl_ssl_engines_list(x) NULL
    263 #define Curl_ssl_send(a,b,c,d,e) -1
    264 #define Curl_ssl_recv(a,b,c,d,e) -1
    265 #define Curl_ssl_initsessions(x,y) CURLE_OK
    266 #define Curl_ssl_version(x,y) 0
    267 #define Curl_ssl_data_pending(x,y) 0
    268 #define Curl_ssl_check_cxn(x) 0
    269 #define Curl_ssl_free_certinfo(x) Curl_nop_stmt
    270 #define Curl_ssl_connect_nonblocking(x,y,z) CURLE_NOT_BUILT_IN
    271 #define Curl_ssl_kill_session(x) Curl_nop_stmt
    272 #define Curl_ssl_random(x,y,z) ((void)x, CURLE_NOT_BUILT_IN)
    273 #define Curl_ssl_cert_status_request() FALSE
    274 #define Curl_ssl_false_start() FALSE
    275 #define Curl_ssl_tls13_ciphersuites() FALSE
    276 #endif
    277 
    278 #endif /* HEADER_CURL_VTLS_H */
    279