File:  [ELWIX - Embedded LightWeight unIX -] / embedaddon / curl / lib / vtls / vtls.h
Revision 1.1.1.1 (vendor branch): download - view: text, annotated - select for diffs - revision graph
Wed Jun 3 10:01:15 2020 UTC (5 years ago) by misho
Branches: curl, MAIN
CVS tags: v7_70_0p4, HEAD
curl

    1: #ifndef HEADER_CURL_VTLS_H
    2: #define HEADER_CURL_VTLS_H
    3: /***************************************************************************
    4:  *                                  _   _ ____  _
    5:  *  Project                     ___| | | |  _ \| |
    6:  *                             / __| | | | |_) | |
    7:  *                            | (__| |_| |  _ <| |___
    8:  *                             \___|\___/|_| \_\_____|
    9:  *
   10:  * Copyright (C) 1998 - 2020, Daniel Stenberg, <daniel@haxx.se>, et al.
   11:  *
   12:  * This software is licensed as described in the file COPYING, which
   13:  * you should have received as part of this distribution. The terms
   14:  * are also available at https://curl.haxx.se/docs/copyright.html.
   15:  *
   16:  * You may opt to use, copy, modify, merge, publish, distribute and/or sell
   17:  * copies of the Software, and permit persons to whom the Software is
   18:  * furnished to do so, under the terms of the COPYING file.
   19:  *
   20:  * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
   21:  * KIND, either express or implied.
   22:  *
   23:  ***************************************************************************/
   24: #include "curl_setup.h"
   25: 
   26: struct connectdata;
   27: struct ssl_connect_data;
   28: 
   29: #define SSLSUPP_CA_PATH      (1<<0) /* supports CAPATH */
   30: #define SSLSUPP_CERTINFO     (1<<1) /* supports CURLOPT_CERTINFO */
   31: #define SSLSUPP_PINNEDPUBKEY (1<<2) /* supports CURLOPT_PINNEDPUBLICKEY */
   32: #define SSLSUPP_SSL_CTX      (1<<3) /* supports CURLOPT_SSL_CTX */
   33: #define SSLSUPP_HTTPS_PROXY  (1<<4) /* supports access via HTTPS proxies */
   34: #define SSLSUPP_TLS13_CIPHERSUITES (1<<5) /* supports TLS 1.3 ciphersuites */
   35: 
   36: struct Curl_ssl {
   37:   /*
   38:    * This *must* be the first entry to allow returning the list of available
   39:    * backends in curl_global_sslset().
   40:    */
   41:   curl_ssl_backend info;
   42:   unsigned int supports; /* bitfield, see above */
   43:   size_t sizeof_ssl_backend_data;
   44: 
   45:   int (*init)(void);
   46:   void (*cleanup)(void);
   47: 
   48:   size_t (*version)(char *buffer, size_t size);
   49:   int (*check_cxn)(struct connectdata *cxn);
   50:   int (*shut_down)(struct connectdata *conn, int sockindex);
   51:   bool (*data_pending)(const struct connectdata *conn,
   52:                        int connindex);
   53: 
   54:   /* return 0 if a find random is filled in */
   55:   CURLcode (*random)(struct Curl_easy *data, unsigned char *entropy,
   56:                      size_t length);
   57:   bool (*cert_status_request)(void);
   58: 
   59:   CURLcode (*connect_blocking)(struct connectdata *conn, int sockindex);
   60:   CURLcode (*connect_nonblocking)(struct connectdata *conn, int sockindex,
   61:                                   bool *done);
   62:   void *(*get_internals)(struct ssl_connect_data *connssl, CURLINFO info);
   63:   void (*close_one)(struct connectdata *conn, int sockindex);
   64:   void (*close_all)(struct Curl_easy *data);
   65:   void (*session_free)(void *ptr);
   66: 
   67:   CURLcode (*set_engine)(struct Curl_easy *data, const char *engine);
   68:   CURLcode (*set_engine_default)(struct Curl_easy *data);
   69:   struct curl_slist *(*engines_list)(struct Curl_easy *data);
   70: 
   71:   bool (*false_start)(void);
   72: 
   73:   CURLcode (*md5sum)(unsigned char *input, size_t inputlen,
   74:                      unsigned char *md5sum, size_t md5sumlen);
   75:   CURLcode (*sha256sum)(const unsigned char *input, size_t inputlen,
   76:                     unsigned char *sha256sum, size_t sha256sumlen);
   77: };
   78: 
   79: #ifdef USE_SSL
   80: extern const struct Curl_ssl *Curl_ssl;
   81: #endif
   82: 
   83: int Curl_none_init(void);
   84: void Curl_none_cleanup(void);
   85: int Curl_none_shutdown(struct connectdata *conn, int sockindex);
   86: int Curl_none_check_cxn(struct connectdata *conn);
   87: CURLcode Curl_none_random(struct Curl_easy *data, unsigned char *entropy,
   88:                           size_t length);
   89: void Curl_none_close_all(struct Curl_easy *data);
   90: void Curl_none_session_free(void *ptr);
   91: bool Curl_none_data_pending(const struct connectdata *conn, int connindex);
   92: bool Curl_none_cert_status_request(void);
   93: CURLcode Curl_none_set_engine(struct Curl_easy *data, const char *engine);
   94: CURLcode Curl_none_set_engine_default(struct Curl_easy *data);
   95: struct curl_slist *Curl_none_engines_list(struct Curl_easy *data);
   96: bool Curl_none_false_start(void);
   97: bool Curl_ssl_tls13_ciphersuites(void);
   98: CURLcode Curl_none_md5sum(unsigned char *input, size_t inputlen,
   99:                           unsigned char *md5sum, size_t md5len);
  100: 
  101: #include "openssl.h"        /* OpenSSL versions */
  102: #include "gtls.h"           /* GnuTLS versions */
  103: #include "nssg.h"           /* NSS versions */
  104: #include "gskit.h"          /* Global Secure ToolKit versions */
  105: #include "wolfssl.h"        /* wolfSSL versions */
  106: #include "schannel.h"       /* Schannel SSPI version */
  107: #include "sectransp.h"      /* SecureTransport (Darwin) version */
  108: #include "mbedtls.h"        /* mbedTLS versions */
  109: #include "mesalink.h"       /* MesaLink versions */
  110: #include "bearssl.h"        /* BearSSL versions */
  111: 
  112: #ifndef MAX_PINNED_PUBKEY_SIZE
  113: #define MAX_PINNED_PUBKEY_SIZE 1048576 /* 1MB */
  114: #endif
  115: 
  116: #ifndef MD5_DIGEST_LENGTH
  117: #ifndef LIBWOLFSSL_VERSION_HEX /* because WolfSSL borks this */
  118: #define MD5_DIGEST_LENGTH 16 /* fixed size */
  119: #endif
  120: #endif
  121: 
  122: #ifndef CURL_SHA256_DIGEST_LENGTH
  123: #define CURL_SHA256_DIGEST_LENGTH 32 /* fixed size */
  124: #endif
  125: 
  126: /* see https://tools.ietf.org/html/draft-ietf-tls-applayerprotoneg-04 */
  127: #define ALPN_HTTP_1_1_LENGTH 8
  128: #define ALPN_HTTP_1_1 "http/1.1"
  129: 
  130: /* set of helper macros for the backends to access the correct fields. For the
  131:    proxy or for the remote host - to properly support HTTPS proxy */
  132: 
  133: #define SSL_IS_PROXY() (CURLPROXY_HTTPS == conn->http_proxy.proxytype && \
  134:   ssl_connection_complete != conn->proxy_ssl[conn->sock[SECONDARYSOCKET] == \
  135:   CURL_SOCKET_BAD ? FIRSTSOCKET : SECONDARYSOCKET].state)
  136: #define SSL_SET_OPTION(var) (SSL_IS_PROXY() ? data->set.proxy_ssl.var : \
  137:                              data->set.ssl.var)
  138: #define SSL_CONN_CONFIG(var) (SSL_IS_PROXY() ?          \
  139:   conn->proxy_ssl_config.var : conn->ssl_config.var)
  140: 
  141: bool Curl_ssl_config_matches(struct ssl_primary_config* data,
  142:                              struct ssl_primary_config* needle);
  143: bool Curl_clone_primary_ssl_config(struct ssl_primary_config *source,
  144:                                    struct ssl_primary_config *dest);
  145: void Curl_free_primary_ssl_config(struct ssl_primary_config* sslc);
  146: int Curl_ssl_getsock(struct connectdata *conn, curl_socket_t *socks);
  147: 
  148: int Curl_ssl_backend(void);
  149: 
  150: #ifdef USE_SSL
  151: int Curl_ssl_init(void);
  152: void Curl_ssl_cleanup(void);
  153: CURLcode Curl_ssl_connect(struct connectdata *conn, int sockindex);
  154: CURLcode Curl_ssl_connect_nonblocking(struct connectdata *conn,
  155:                                       int sockindex,
  156:                                       bool *done);
  157: /* tell the SSL stuff to close down all open information regarding
  158:    connections (and thus session ID caching etc) */
  159: void Curl_ssl_close_all(struct Curl_easy *data);
  160: void Curl_ssl_close(struct connectdata *conn, int sockindex);
  161: CURLcode Curl_ssl_shutdown(struct connectdata *conn, int sockindex);
  162: CURLcode Curl_ssl_set_engine(struct Curl_easy *data, const char *engine);
  163: /* Sets engine as default for all SSL operations */
  164: CURLcode Curl_ssl_set_engine_default(struct Curl_easy *data);
  165: struct curl_slist *Curl_ssl_engines_list(struct Curl_easy *data);
  166: 
  167: /* init the SSL session ID cache */
  168: CURLcode Curl_ssl_initsessions(struct Curl_easy *, size_t);
  169: size_t Curl_ssl_version(char *buffer, size_t size);
  170: bool Curl_ssl_data_pending(const struct connectdata *conn,
  171:                            int connindex);
  172: int Curl_ssl_check_cxn(struct connectdata *conn);
  173: 
  174: /* Certificate information list handling. */
  175: 
  176: void Curl_ssl_free_certinfo(struct Curl_easy *data);
  177: CURLcode Curl_ssl_init_certinfo(struct Curl_easy *data, int num);
  178: CURLcode Curl_ssl_push_certinfo_len(struct Curl_easy *data, int certnum,
  179:                                     const char *label, const char *value,
  180:                                     size_t valuelen);
  181: CURLcode Curl_ssl_push_certinfo(struct Curl_easy *data, int certnum,
  182:                                 const char *label, const char *value);
  183: 
  184: /* Functions to be used by SSL library adaptation functions */
  185: 
  186: /* Lock session cache mutex.
  187:  * Call this before calling other Curl_ssl_*session* functions
  188:  * Caller should unlock this mutex as soon as possible, as it may block
  189:  * other SSL connection from making progress.
  190:  * The purpose of explicitly locking SSL session cache data is to allow
  191:  * individual SSL engines to manage session lifetime in their specific way.
  192:  */
  193: void Curl_ssl_sessionid_lock(struct connectdata *conn);
  194: 
  195: /* Unlock session cache mutex */
  196: void Curl_ssl_sessionid_unlock(struct connectdata *conn);
  197: 
  198: /* extract a session ID
  199:  * Sessionid mutex must be locked (see Curl_ssl_sessionid_lock).
  200:  * Caller must make sure that the ownership of returned sessionid object
  201:  * is properly taken (e.g. its refcount is incremented
  202:  * under sessionid mutex).
  203:  */
  204: bool Curl_ssl_getsessionid(struct connectdata *conn,
  205:                            void **ssl_sessionid,
  206:                            size_t *idsize, /* set 0 if unknown */
  207:                            int sockindex);
  208: /* add a new session ID
  209:  * Sessionid mutex must be locked (see Curl_ssl_sessionid_lock).
  210:  * Caller must ensure that it has properly shared ownership of this sessionid
  211:  * object with cache (e.g. incrementing refcount on success)
  212:  */
  213: CURLcode Curl_ssl_addsessionid(struct connectdata *conn,
  214:                                void *ssl_sessionid,
  215:                                size_t idsize,
  216:                                int sockindex);
  217: /* Kill a single session ID entry in the cache
  218:  * Sessionid mutex must be locked (see Curl_ssl_sessionid_lock).
  219:  * This will call engine-specific curlssl_session_free function, which must
  220:  * take sessionid object ownership from sessionid cache
  221:  * (e.g. decrement refcount).
  222:  */
  223: void Curl_ssl_kill_session(struct curl_ssl_session *session);
  224: /* delete a session from the cache
  225:  * Sessionid mutex must be locked (see Curl_ssl_sessionid_lock).
  226:  * This will call engine-specific curlssl_session_free function, which must
  227:  * take sessionid object ownership from sessionid cache
  228:  * (e.g. decrement refcount).
  229:  */
  230: void Curl_ssl_delsessionid(struct connectdata *conn, void *ssl_sessionid);
  231: 
  232: /* get N random bytes into the buffer */
  233: CURLcode Curl_ssl_random(struct Curl_easy *data, unsigned char *buffer,
  234:                          size_t length);
  235: CURLcode Curl_ssl_md5sum(unsigned char *tmp, /* input */
  236:                          size_t tmplen,
  237:                          unsigned char *md5sum, /* output */
  238:                          size_t md5len);
  239: /* Check pinned public key. */
  240: CURLcode Curl_pin_peer_pubkey(struct Curl_easy *data,
  241:                               const char *pinnedpubkey,
  242:                               const unsigned char *pubkey, size_t pubkeylen);
  243: 
  244: bool Curl_ssl_cert_status_request(void);
  245: 
  246: bool Curl_ssl_false_start(void);
  247: 
  248: #define SSL_SHUTDOWN_TIMEOUT 10000 /* ms */
  249: 
  250: #else /* if not USE_SSL */
  251: 
  252: /* When SSL support is not present, just define away these function calls */
  253: #define Curl_ssl_init() 1
  254: #define Curl_ssl_cleanup() Curl_nop_stmt
  255: #define Curl_ssl_connect(x,y) CURLE_NOT_BUILT_IN
  256: #define Curl_ssl_close_all(x) Curl_nop_stmt
  257: #define Curl_ssl_close(x,y) Curl_nop_stmt
  258: #define Curl_ssl_shutdown(x,y) CURLE_NOT_BUILT_IN
  259: #define Curl_ssl_set_engine(x,y) CURLE_NOT_BUILT_IN
  260: #define Curl_ssl_set_engine_default(x) CURLE_NOT_BUILT_IN
  261: #define Curl_ssl_engines_list(x) NULL
  262: #define Curl_ssl_send(a,b,c,d,e) -1
  263: #define Curl_ssl_recv(a,b,c,d,e) -1
  264: #define Curl_ssl_initsessions(x,y) CURLE_OK
  265: #define Curl_ssl_data_pending(x,y) 0
  266: #define Curl_ssl_check_cxn(x) 0
  267: #define Curl_ssl_free_certinfo(x) Curl_nop_stmt
  268: #define Curl_ssl_connect_nonblocking(x,y,z) CURLE_NOT_BUILT_IN
  269: #define Curl_ssl_kill_session(x) Curl_nop_stmt
  270: #define Curl_ssl_random(x,y,z) ((void)x, CURLE_NOT_BUILT_IN)
  271: #define Curl_ssl_cert_status_request() FALSE
  272: #define Curl_ssl_false_start() FALSE
  273: #define Curl_ssl_tls13_ciphersuites() FALSE
  274: #endif
  275: 
  276: #endif /* HEADER_CURL_VTLS_H */

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>