mirror of
https://github.com/curl/curl.git
synced 2026-04-13 00:31:41 +08:00
Convert more `int port` to `uint16_t` port types. Reshuffle ports in connectdata to save some bytes. Change `conn->destination` format to - make it more readable and thus usable in tracing - add the IPv6 scope_id only when not default (global) and make it resemble more the textual format for IPv6 (e.g. suffix '%<scope_id>') Closes #20918
276 lines
10 KiB
C
276 lines
10 KiB
C
#ifndef HEADER_CURL_VTLS_H
|
|
#define HEADER_CURL_VTLS_H
|
|
/***************************************************************************
|
|
* _ _ ____ _
|
|
* Project ___| | | | _ \| |
|
|
* / __| | | | |_) | |
|
|
* | (__| |_| | _ <| |___
|
|
* \___|\___/|_| \_\_____|
|
|
*
|
|
* Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
|
|
*
|
|
* This software is licensed as described in the file COPYING, which
|
|
* you should have received as part of this distribution. The terms
|
|
* are also available at https://curl.se/docs/copyright.html.
|
|
*
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
* copies of the Software, and permit persons to whom the Software is
|
|
* furnished to do so, under the terms of the COPYING file.
|
|
*
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
* KIND, either express or implied.
|
|
*
|
|
* SPDX-License-Identifier: curl
|
|
*
|
|
***************************************************************************/
|
|
#include "curl_setup.h"
|
|
|
|
struct connectdata;
|
|
struct ssl_config_data;
|
|
struct ssl_primary_config;
|
|
struct Curl_cfilter;
|
|
struct Curl_easy;
|
|
struct dynbuf;
|
|
|
|
#define SSLSUPP_CA_PATH (1 << 0) /* supports CAPATH */
|
|
#define SSLSUPP_CERTINFO (1 << 1) /* supports CURLOPT_CERTINFO */
|
|
#define SSLSUPP_PINNEDPUBKEY (1 << 2) /* supports CURLOPT_PINNEDPUBLICKEY */
|
|
#define SSLSUPP_SSL_CTX (1 << 3) /* supports CURLOPT_SSL_CTX */
|
|
#define SSLSUPP_HTTPS_PROXY (1 << 4) /* supports access via HTTPS proxies */
|
|
#define SSLSUPP_TLS13_CIPHERSUITES (1 << 5) /* supports TLS 1.3 ciphersuites */
|
|
#define SSLSUPP_CAINFO_BLOB (1 << 6)
|
|
#define SSLSUPP_ECH (1 << 7)
|
|
#define SSLSUPP_CA_CACHE (1 << 8)
|
|
#define SSLSUPP_CIPHER_LIST (1 << 9) /* supports TLS 1.0-1.2 ciphersuites */
|
|
#define SSLSUPP_SIGNATURE_ALGORITHMS (1 << 10) /* supports TLS sigalgs */
|
|
#define SSLSUPP_ISSUERCERT (1 << 11) /* supports CURLOPT_ISSUERCERT */
|
|
#define SSLSUPP_SSL_EC_CURVES (1 << 12) /* supports CURLOPT_SSL_EC_CURVES */
|
|
#define SSLSUPP_CRLFILE (1 << 13) /* supports CURLOPT_CRLFILE */
|
|
#define SSLSUPP_ISSUERCERT_BLOB (1 << 14) /* CURLOPT_ISSUERCERT_BLOB */
|
|
|
|
#ifdef USE_ECH
|
|
/* CURLECH_ bits for the tls_ech option */
|
|
#define CURLECH_DISABLE (1 << 0)
|
|
#define CURLECH_GREASE (1 << 1)
|
|
#define CURLECH_ENABLE (1 << 2)
|
|
#define CURLECH_HARD (1 << 3)
|
|
#define CURLECH_CLA_CFG (1 << 4)
|
|
|
|
#define CURLECH_ENABLED(data) \
|
|
((data)->set.tls_ech && !((data)->set.tls_ech & CURLECH_DISABLE))
|
|
#endif /* USE_ECH */
|
|
|
|
#define ALPN_ACCEPTED "ALPN: server accepted "
|
|
|
|
#define VTLS_INFOF_NO_ALPN \
|
|
"ALPN: server did not agree on a protocol. Uses default."
|
|
#define VTLS_INFOF_ALPN_OFFER_1STR \
|
|
"ALPN: curl offers %s"
|
|
#define VTLS_INFOF_ALPN_ACCEPTED \
|
|
ALPN_ACCEPTED "%.*s"
|
|
|
|
#define VTLS_INFOF_NO_ALPN_DEFERRED \
|
|
"ALPN: deferred handshake for early data without specific protocol."
|
|
#define VTLS_INFOF_ALPN_DEFERRED \
|
|
"ALPN: deferred handshake for early data using '%.*s'."
|
|
|
|
/* IETF defined version numbers used in TLS protocol negotiation */
|
|
#define CURL_IETF_PROTO_UNKNOWN 0x0
|
|
#define CURL_IETF_PROTO_SSL3 0x0300
|
|
#define CURL_IETF_PROTO_TLS1 0x0301
|
|
#define CURL_IETF_PROTO_TLS1_1 0x0302
|
|
#define CURL_IETF_PROTO_TLS1_2 0x0303
|
|
#define CURL_IETF_PROTO_TLS1_3 0x0304
|
|
#define CURL_IETF_PROTO_DTLS1 0xFEFF
|
|
#define CURL_IETF_PROTO_DTLS1_2 0xFEFD
|
|
|
|
typedef enum {
|
|
CURL_SSL_PEER_DNS,
|
|
CURL_SSL_PEER_IPV4,
|
|
CURL_SSL_PEER_IPV6
|
|
} ssl_peer_type;
|
|
|
|
struct ssl_peer {
|
|
char *hostname; /* hostname for verification */
|
|
char *dispname; /* display version of hostname */
|
|
char *sni; /* SNI version of hostname or NULL if not usable */
|
|
char *scache_key; /* for lookups in session cache */
|
|
ssl_peer_type type; /* type of the peer information */
|
|
uint16_t port; /* port we are talking to */
|
|
uint8_t transport; /* one of TRNSPRT_* defines */
|
|
};
|
|
|
|
CURLsslset Curl_init_sslset_nolock(curl_sslbackend id, const char *name,
|
|
const curl_ssl_backend ***avail);
|
|
|
|
#define MAX_PINNED_PUBKEY_SIZE (1024 * 1024) /* 1 MiB */
|
|
|
|
curl_sslbackend Curl_ssl_backend(void);
|
|
|
|
/**
|
|
* Init ssl config for a new easy handle.
|
|
*/
|
|
void Curl_ssl_easy_config_init(struct Curl_easy *data);
|
|
|
|
/**
|
|
* Init the `data->set.ssl` and `data->set.proxy_ssl` for
|
|
* connection matching use.
|
|
*/
|
|
CURLcode Curl_ssl_easy_config_complete(struct Curl_easy *data);
|
|
|
|
/**
|
|
* Init SSL configs (main + proxy) for a new connection from the easy handle.
|
|
*/
|
|
CURLcode Curl_ssl_conn_config_init(struct Curl_easy *data,
|
|
struct connectdata *conn);
|
|
|
|
/**
|
|
* Free allocated resources in SSL configs (main + proxy) for
|
|
* the given connection.
|
|
*/
|
|
void Curl_ssl_conn_config_cleanup(struct connectdata *conn);
|
|
|
|
/**
|
|
* Return TRUE iff SSL configuration from `data` is functionally the
|
|
* same as the one on `candidate`.
|
|
* @param proxy match the proxy SSL config or the main one
|
|
*/
|
|
bool Curl_ssl_conn_config_match(struct Curl_easy *data,
|
|
struct connectdata *candidate,
|
|
bool proxy);
|
|
|
|
/* Update certain connection SSL config flags after they have
|
|
* been changed on the easy handle. Works for `verifypeer`,
|
|
* `verifyhost` and `verifystatus`. */
|
|
void Curl_ssl_conn_config_update(struct Curl_easy *data, bool for_proxy);
|
|
|
|
/**
|
|
* Init SSL peer information for filter. Can be called repeatedly.
|
|
*/
|
|
CURLcode Curl_ssl_peer_init(struct ssl_peer *peer,
|
|
struct Curl_cfilter *cf,
|
|
const char *tls_id,
|
|
uint8_t transport);
|
|
/**
|
|
* Free all allocated data and reset peer information.
|
|
*/
|
|
void Curl_ssl_peer_cleanup(struct ssl_peer *peer);
|
|
|
|
#ifdef USE_SSL
|
|
int Curl_ssl_init(void);
|
|
void Curl_ssl_cleanup(void);
|
|
/* tell the SSL stuff to close down all open information regarding
|
|
connections (and thus session ID caching etc) */
|
|
void Curl_ssl_close_all(struct Curl_easy *data);
|
|
CURLcode Curl_ssl_set_engine(struct Curl_easy *data, const char *engine);
|
|
/* Sets engine as default for all SSL operations */
|
|
CURLcode Curl_ssl_set_engine_default(struct Curl_easy *data);
|
|
struct curl_slist *Curl_ssl_engines_list(struct Curl_easy *data);
|
|
|
|
void Curl_ssl_version(char *buffer, size_t size);
|
|
|
|
/* Certificate information list handling. */
|
|
#define CURL_X509_STR_MAX 100000
|
|
#define MAX_ALLOWED_CERT_AMOUNT 100
|
|
|
|
void Curl_ssl_free_certinfo(struct Curl_easy *data);
|
|
CURLcode Curl_ssl_init_certinfo(struct Curl_easy *data, int num);
|
|
CURLcode Curl_ssl_push_certinfo_len(struct Curl_easy *data, int certnum,
|
|
const char *label, const char *value,
|
|
size_t valuelen);
|
|
CURLcode Curl_ssl_push_certinfo(struct Curl_easy *data, int certnum,
|
|
const char *label, const char *value);
|
|
|
|
/* Functions to be used by SSL library adaptation functions */
|
|
|
|
/* get N random bytes into the buffer */
|
|
CURLcode Curl_ssl_random(struct Curl_easy *data,
|
|
unsigned char *buffer, size_t length);
|
|
/* Check pinned public key. */
|
|
CURLcode Curl_pin_peer_pubkey(struct Curl_easy *data,
|
|
const char *pinnedpubkey,
|
|
const unsigned char *pubkey, size_t pubkeylen);
|
|
|
|
bool Curl_ssl_cert_status_request(void);
|
|
|
|
/* The maximum size of the SSL channel binding is 85 bytes, as defined in
|
|
* RFC 5929, Section 4.1. The 'tls-server-end-point:' prefix is 21 bytes long,
|
|
* and SHA-512 is the longest supported hash algorithm, with a digest length of
|
|
* 64 bytes.
|
|
* The maximum size of the channel binding is therefore 21 + 64 = 85 bytes.
|
|
*/
|
|
#define SSL_CB_MAX_SIZE 85
|
|
|
|
/* Return the tls-server-end-point channel binding, including the
|
|
* 'tls-server-end-point:' prefix.
|
|
* If successful, the data is written to the dynbuf, and CURLE_OK is returned.
|
|
* The dynbuf MUST HAVE a minimum toobig size of SSL_CB_MAX_SIZE.
|
|
* If the dynbuf is too small, CURLE_OUT_OF_MEMORY is returned.
|
|
* If channel binding is not supported, binding stays empty and CURLE_OK is
|
|
* returned.
|
|
*/
|
|
CURLcode Curl_ssl_get_channel_binding(struct Curl_easy *data, int sockindex,
|
|
struct dynbuf *binding);
|
|
|
|
#define SSL_SHUTDOWN_TIMEOUT 10000 /* ms */
|
|
|
|
CURLcode Curl_ssl_cfilter_add(struct Curl_easy *data,
|
|
struct connectdata *conn,
|
|
int sockindex);
|
|
|
|
CURLcode Curl_cf_ssl_insert_after(struct Curl_cfilter *cf_at,
|
|
struct Curl_easy *data);
|
|
|
|
CURLcode Curl_ssl_cfilter_remove(struct Curl_easy *data,
|
|
int sockindex, bool send_shutdown);
|
|
|
|
#ifndef CURL_DISABLE_PROXY
|
|
CURLcode Curl_cf_ssl_proxy_insert_after(struct Curl_cfilter *cf_at,
|
|
struct Curl_easy *data);
|
|
#endif /* !CURL_DISABLE_PROXY */
|
|
|
|
/**
|
|
* True iff the underlying SSL implementation supports the option.
|
|
* Option is one of the defined SSLSUPP_* values.
|
|
* `data` maybe NULL for the features of the default implementation.
|
|
*/
|
|
bool Curl_ssl_supports(struct Curl_easy *data, unsigned int ssl_option);
|
|
|
|
/**
|
|
* Get the ssl_config_data in `data` that is relevant for cfilter `cf`.
|
|
*/
|
|
struct ssl_config_data *Curl_ssl_cf_get_config(struct Curl_cfilter *cf,
|
|
struct Curl_easy *data);
|
|
|
|
/**
|
|
* Get the primary config relevant for the filter from its connection.
|
|
*/
|
|
struct ssl_primary_config *
|
|
Curl_ssl_cf_get_primary_config(struct Curl_cfilter *cf);
|
|
|
|
extern struct Curl_cftype Curl_cft_ssl;
|
|
#ifndef CURL_DISABLE_PROXY
|
|
extern struct Curl_cftype Curl_cft_ssl_proxy;
|
|
#endif
|
|
|
|
#else /* if not USE_SSL */
|
|
|
|
/* When SSL support is not present, define away these function calls */
|
|
#define Curl_ssl_init() 1
|
|
#define Curl_ssl_cleanup() Curl_nop_stmt
|
|
#define Curl_ssl_close_all(x) Curl_nop_stmt
|
|
#define Curl_ssl_set_engine(x, y) CURLE_NOT_BUILT_IN
|
|
#define Curl_ssl_set_engine_default(x) CURLE_NOT_BUILT_IN
|
|
#define Curl_ssl_engines_list(x) NULL
|
|
#define Curl_ssl_free_certinfo(x) Curl_nop_stmt
|
|
#define Curl_ssl_random(x, y, z) ((void)(x), CURLE_NOT_BUILT_IN)
|
|
#define Curl_ssl_cert_status_request() FALSE
|
|
#define Curl_ssl_supports(a, b) FALSE
|
|
#define Curl_ssl_cfilter_add(a, b, c) CURLE_NOT_BUILT_IN
|
|
#define Curl_ssl_cfilter_remove(a, b, c) CURLE_OK
|
|
#define Curl_ssl_cf_get_config(a, b) NULL
|
|
#define Curl_ssl_cf_get_primary_config(a) NULL
|
|
#endif
|
|
|
|
#endif /* HEADER_CURL_VTLS_H */
|