2014-09-10 10:07:58 +04:00
|
|
|
#ifndef HEADER_CURL_VTLS_H
|
|
|
|
#define HEADER_CURL_VTLS_H
|
|
|
|
/***************************************************************************
|
|
|
|
* _ _ ____ _
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
* | (__| |_| | _ <| |___
|
|
|
|
* \___|\___/|_| \_\_____|
|
|
|
|
*
|
2016-08-03 09:37:16 +03:00
|
|
|
* Copyright (C) 1998 - 2016, Daniel Stenberg, <daniel@haxx.se>, et al.
|
2014-09-10 10:07:58 +04:00
|
|
|
*
|
|
|
|
* This software is licensed as described in the file COPYING, which
|
|
|
|
* you should have received as part of this distribution. The terms
|
2016-08-03 09:37:16 +03:00
|
|
|
* are also available at https://curl.haxx.se/docs/copyright.html.
|
2014-09-10 10:07:58 +04:00
|
|
|
*
|
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
|
|
|
* furnished to do so, under the terms of the COPYING file.
|
|
|
|
*
|
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
* KIND, either express or implied.
|
|
|
|
*
|
|
|
|
***************************************************************************/
|
|
|
|
#include "curl_setup.h"
|
|
|
|
|
2015-08-11 21:13:01 +03:00
|
|
|
#include "openssl.h" /* OpenSSL versions */
|
|
|
|
#include "gtls.h" /* GnuTLS versions */
|
|
|
|
#include "nssg.h" /* NSS versions */
|
|
|
|
#include "gskit.h" /* Global Secure ToolKit versions */
|
|
|
|
#include "polarssl.h" /* PolarSSL versions */
|
|
|
|
#include "axtls.h" /* axTLS versions */
|
|
|
|
#include "cyassl.h" /* CyaSSL versions */
|
|
|
|
#include "schannel.h" /* Schannel SSPI version */
|
|
|
|
#include "darwinssl.h" /* SecureTransport (Darwin) version */
|
2016-08-03 09:37:16 +03:00
|
|
|
#include "mbedtls.h" /* mbedTLS versions */
|
2015-08-11 21:13:01 +03:00
|
|
|
|
|
|
|
#ifndef MAX_PINNED_PUBKEY_SIZE
|
|
|
|
#define MAX_PINNED_PUBKEY_SIZE 1048576 /* 1MB */
|
|
|
|
#endif
|
|
|
|
|
2014-09-10 10:07:58 +04:00
|
|
|
#ifndef MD5_DIGEST_LENGTH
|
|
|
|
#define MD5_DIGEST_LENGTH 16 /* fixed size */
|
|
|
|
#endif
|
|
|
|
|
2015-08-11 21:13:01 +03:00
|
|
|
#ifndef SHA256_DIGEST_LENGTH
|
|
|
|
#define SHA256_DIGEST_LENGTH 32 /* fixed size */
|
|
|
|
#endif
|
|
|
|
|
2016-08-03 09:37:16 +03:00
|
|
|
/* see https://tools.ietf.org/html/draft-ietf-tls-applayerprotoneg-04 */
|
2014-09-10 10:07:58 +04:00
|
|
|
#define ALPN_HTTP_1_1_LENGTH 8
|
|
|
|
#define ALPN_HTTP_1_1 "http/1.1"
|
|
|
|
|
|
|
|
bool Curl_ssl_config_matches(struct ssl_config_data* data,
|
|
|
|
struct ssl_config_data* needle);
|
|
|
|
bool Curl_clone_ssl_config(struct ssl_config_data* source,
|
|
|
|
struct ssl_config_data* dest);
|
|
|
|
void Curl_free_ssl_config(struct ssl_config_data* sslc);
|
|
|
|
|
2016-08-03 09:37:16 +03:00
|
|
|
unsigned int Curl_rand(struct Curl_easy *);
|
2014-09-10 10:07:58 +04:00
|
|
|
|
|
|
|
int Curl_ssl_backend(void);
|
|
|
|
|
|
|
|
#ifdef USE_SSL
|
|
|
|
int Curl_ssl_init(void);
|
|
|
|
void Curl_ssl_cleanup(void);
|
|
|
|
CURLcode Curl_ssl_connect(struct connectdata *conn, int sockindex);
|
|
|
|
CURLcode Curl_ssl_connect_nonblocking(struct connectdata *conn,
|
|
|
|
int sockindex,
|
|
|
|
bool *done);
|
|
|
|
/* tell the SSL stuff to close down all open information regarding
|
|
|
|
connections (and thus session ID caching etc) */
|
2016-08-03 09:37:16 +03:00
|
|
|
void Curl_ssl_close_all(struct Curl_easy *data);
|
2014-09-10 10:07:58 +04:00
|
|
|
void Curl_ssl_close(struct connectdata *conn, int sockindex);
|
|
|
|
CURLcode Curl_ssl_shutdown(struct connectdata *conn, int sockindex);
|
2016-08-03 09:37:16 +03:00
|
|
|
CURLcode Curl_ssl_set_engine(struct Curl_easy *data, const char *engine);
|
2014-09-10 10:07:58 +04:00
|
|
|
/* Sets engine as default for all SSL operations */
|
2016-08-03 09:37:16 +03:00
|
|
|
CURLcode Curl_ssl_set_engine_default(struct Curl_easy *data);
|
|
|
|
struct curl_slist *Curl_ssl_engines_list(struct Curl_easy *data);
|
2014-09-10 10:07:58 +04:00
|
|
|
|
|
|
|
/* init the SSL session ID cache */
|
2016-08-03 09:37:16 +03:00
|
|
|
CURLcode Curl_ssl_initsessions(struct Curl_easy *, size_t);
|
2014-09-10 10:07:58 +04:00
|
|
|
size_t Curl_ssl_version(char *buffer, size_t size);
|
|
|
|
bool Curl_ssl_data_pending(const struct connectdata *conn,
|
|
|
|
int connindex);
|
|
|
|
int Curl_ssl_check_cxn(struct connectdata *conn);
|
|
|
|
|
|
|
|
/* Certificate information list handling. */
|
|
|
|
|
2016-08-03 09:37:16 +03:00
|
|
|
void Curl_ssl_free_certinfo(struct Curl_easy *data);
|
|
|
|
CURLcode Curl_ssl_init_certinfo(struct Curl_easy * data, int num);
|
|
|
|
CURLcode Curl_ssl_push_certinfo_len(struct Curl_easy * data, int certnum,
|
2014-09-10 10:07:58 +04:00
|
|
|
const char * label, const char * value,
|
|
|
|
size_t valuelen);
|
2016-08-03 09:37:16 +03:00
|
|
|
CURLcode Curl_ssl_push_certinfo(struct Curl_easy * data, int certnum,
|
2014-09-10 10:07:58 +04:00
|
|
|
const char * label, const char * value);
|
|
|
|
|
|
|
|
/* Functions to be used by SSL library adaptation functions */
|
|
|
|
|
2016-08-03 09:37:16 +03:00
|
|
|
/* Lock session cache mutex.
|
|
|
|
* Call this before calling other Curl_ssl_*session* functions
|
|
|
|
* Caller should unlock this mutex as soon as possible, as it may block
|
|
|
|
* other SSL connection from making progress.
|
|
|
|
* The purpose of explicitly locking SSL session cache data is to allow
|
|
|
|
* individual SSL engines to manage session lifetime in their specific way.
|
|
|
|
*/
|
|
|
|
void Curl_ssl_sessionid_lock(struct connectdata *conn);
|
|
|
|
|
|
|
|
/* Unlock session cache mutex */
|
|
|
|
void Curl_ssl_sessionid_unlock(struct connectdata *conn);
|
|
|
|
|
|
|
|
/* extract a session ID
|
|
|
|
* Sessionid mutex must be locked (see Curl_ssl_sessionid_lock).
|
|
|
|
* Caller must make sure that the ownership of returned sessionid object
|
|
|
|
* is properly taken (e.g. its refcount is incremented
|
|
|
|
* under sessionid mutex).
|
|
|
|
*/
|
2015-08-11 21:13:01 +03:00
|
|
|
bool Curl_ssl_getsessionid(struct connectdata *conn,
|
|
|
|
void **ssl_sessionid,
|
2016-08-03 09:37:16 +03:00
|
|
|
size_t *idsize); /* set 0 if unknown */
|
|
|
|
/* add a new session ID
|
|
|
|
* Sessionid mutex must be locked (see Curl_ssl_sessionid_lock).
|
|
|
|
* Caller must ensure that it has properly shared ownership of this sessionid
|
|
|
|
* object with cache (e.g. incrementing refcount on success)
|
|
|
|
*/
|
2014-09-10 10:07:58 +04:00
|
|
|
CURLcode Curl_ssl_addsessionid(struct connectdata *conn,
|
|
|
|
void *ssl_sessionid,
|
|
|
|
size_t idsize);
|
2016-08-03 09:37:16 +03:00
|
|
|
/* Kill a single session ID entry in the cache
|
|
|
|
* Sessionid mutex must be locked (see Curl_ssl_sessionid_lock).
|
|
|
|
* This will call engine-specific curlssl_session_free function, which must
|
|
|
|
* take sessionid object ownership from sessionid cache
|
|
|
|
* (e.g. decrement refcount).
|
|
|
|
*/
|
2014-09-10 10:07:58 +04:00
|
|
|
void Curl_ssl_kill_session(struct curl_ssl_session *session);
|
2016-08-03 09:37:16 +03:00
|
|
|
/* delete a session from the cache
|
|
|
|
* Sessionid mutex must be locked (see Curl_ssl_sessionid_lock).
|
|
|
|
* This will call engine-specific curlssl_session_free function, which must
|
|
|
|
* take sessionid object ownership from sessionid cache
|
|
|
|
* (e.g. decrement refcount).
|
|
|
|
*/
|
2014-09-10 10:07:58 +04:00
|
|
|
void Curl_ssl_delsessionid(struct connectdata *conn, void *ssl_sessionid);
|
|
|
|
|
|
|
|
/* get N random bytes into the buffer, return 0 if a find random is filled
|
|
|
|
in */
|
2016-08-03 09:37:16 +03:00
|
|
|
int Curl_ssl_random(struct Curl_easy *data, unsigned char *buffer,
|
2014-09-10 10:07:58 +04:00
|
|
|
size_t length);
|
2015-08-11 21:13:01 +03:00
|
|
|
CURLcode Curl_ssl_md5sum(unsigned char *tmp, /* input */
|
|
|
|
size_t tmplen,
|
|
|
|
unsigned char *md5sum, /* output */
|
|
|
|
size_t md5len);
|
|
|
|
/* Check pinned public key. */
|
2016-08-03 09:37:16 +03:00
|
|
|
CURLcode Curl_pin_peer_pubkey(struct Curl_easy *data,
|
|
|
|
const char *pinnedpubkey,
|
2015-08-11 21:13:01 +03:00
|
|
|
const unsigned char *pubkey, size_t pubkeylen);
|
2014-09-10 10:07:58 +04:00
|
|
|
|
2015-08-11 21:13:01 +03:00
|
|
|
bool Curl_ssl_cert_status_request(void);
|
2014-09-10 10:07:58 +04:00
|
|
|
|
2015-08-11 21:13:01 +03:00
|
|
|
bool Curl_ssl_false_start(void);
|
|
|
|
|
|
|
|
#define SSL_SHUTDOWN_TIMEOUT 10000 /* ms */
|
2014-09-10 10:07:58 +04:00
|
|
|
|
|
|
|
#else
|
2015-08-11 21:13:01 +03:00
|
|
|
/* Set the API backend definition to none */
|
|
|
|
#define CURL_SSL_BACKEND CURLSSLBACKEND_NONE
|
|
|
|
|
2014-09-10 10:07:58 +04:00
|
|
|
/* When SSL support is not present, just define away these function calls */
|
|
|
|
#define Curl_ssl_init() 1
|
|
|
|
#define Curl_ssl_cleanup() Curl_nop_stmt
|
|
|
|
#define Curl_ssl_connect(x,y) CURLE_NOT_BUILT_IN
|
|
|
|
#define Curl_ssl_close_all(x) Curl_nop_stmt
|
|
|
|
#define Curl_ssl_close(x,y) Curl_nop_stmt
|
|
|
|
#define Curl_ssl_shutdown(x,y) CURLE_NOT_BUILT_IN
|
|
|
|
#define Curl_ssl_set_engine(x,y) CURLE_NOT_BUILT_IN
|
|
|
|
#define Curl_ssl_set_engine_default(x) CURLE_NOT_BUILT_IN
|
|
|
|
#define Curl_ssl_engines_list(x) NULL
|
|
|
|
#define Curl_ssl_send(a,b,c,d,e) -1
|
|
|
|
#define Curl_ssl_recv(a,b,c,d,e) -1
|
|
|
|
#define Curl_ssl_initsessions(x,y) CURLE_OK
|
|
|
|
#define Curl_ssl_version(x,y) 0
|
|
|
|
#define Curl_ssl_data_pending(x,y) 0
|
|
|
|
#define Curl_ssl_check_cxn(x) 0
|
|
|
|
#define Curl_ssl_free_certinfo(x) Curl_nop_stmt
|
|
|
|
#define Curl_ssl_connect_nonblocking(x,y,z) CURLE_NOT_BUILT_IN
|
|
|
|
#define Curl_ssl_kill_session(x) Curl_nop_stmt
|
2015-08-11 21:13:01 +03:00
|
|
|
#define Curl_ssl_random(x,y,z) ((void)x, CURLE_NOT_BUILT_IN)
|
|
|
|
#define Curl_ssl_cert_status_request() FALSE
|
|
|
|
#define Curl_ssl_false_start() FALSE
|
2014-09-10 10:07:58 +04:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#endif /* HEADER_CURL_VTLS_H */
|