BUILD: ssl: fix to build (again) with boringssl

Limitations:
. disable force-ssl/tls (need more work)
should be set earlier with SSL_CTX_new (SSL_CTX_set_ssl_version is removed)
. disable generate-certificates (need more work)
introduce SSL_NO_GENERATE_CERTIFICATES to disable generate-certificates.

Cleanup some #ifdef and type related to boringssl env.
diff --git a/include/proto/openssl-compat.h b/include/proto/openssl-compat.h
index 5a31f02..645c9b7 100644
--- a/include/proto/openssl-compat.h
+++ b/include/proto/openssl-compat.h
@@ -104,10 +104,12 @@
 	return 1;
 }
 
+#if (!defined OPENSSL_NO_OCSP)
 static inline const OCSP_CERTID *OCSP_SINGLERESP_get0_id(const OCSP_SINGLERESP *single)
 {
 	return single->certId;
 }
+#endif
 
 static inline pem_password_cb *SSL_CTX_get_default_passwd_cb(SSL_CTX *ctx)
 {
@@ -147,4 +149,13 @@
 #define __OPENSSL_110_CONST__
 #endif
 
+#ifdef OPENSSL_IS_BORINGSSL
+#define SSL_NO_GENERATE_CERTIFICATES
+
+static inline int EVP_PKEY_base_id(EVP_PKEY *pkey)
+{
+	return EVP_PKEY_type(pkey->type);
+}
+#endif
+
 #endif /* _PROTO_OPENSSL_COMPAT_H */
diff --git a/src/ssl_sock.c b/src/ssl_sock.c
index 95f979c..3d47149 100644
--- a/src/ssl_sock.c
+++ b/src/ssl_sock.c
@@ -176,7 +176,7 @@
 static DH *local_dh_4096 = NULL;
 #endif /* OPENSSL_NO_DH */
 
-#ifdef SSL_CTRL_SET_TLSEXT_HOSTNAME
+#if (defined SSL_CTRL_SET_TLSEXT_HOSTNAME && !defined SSL_NO_GENERATE_CERTIFICATES)
 /* X509V3 Extensions that will be added on generated certificates */
 #define X509V3_EXT_SIZE 5
 static char *x509v3_ext_names[X509V3_EXT_SIZE] = {
@@ -193,14 +193,13 @@
 	"keyid,issuer:always",
 	"nonRepudiation,digitalSignature,keyEncipherment"
 };
-
-static struct ssl_bind_kw ssl_bind_kws[];
-
 /* LRU cache to store generated certificate */
 static struct lru64_head *ssl_ctx_lru_tree = NULL;
 static unsigned int       ssl_ctx_lru_seed = 0;
 #endif // SSL_CTRL_SET_TLSEXT_HOSTNAME
 
+static struct ssl_bind_kw ssl_bind_kws[];
+
 #if OPENSSL_VERSION_NUMBER >= 0x1000200fL
 /* The order here matters for picking a default context,
  * keep the most common keytype at the bottom of the list
@@ -215,6 +214,27 @@
 #define SSL_SOCK_NUM_KEYTYPES 1
 #endif
 
+/*
+ * This function gives the detail of the SSL error. It is used only
+ * if the debug mode and the verbose mode are activated. It dump all
+ * the SSL error until the stack was empty.
+ */
+static forceinline void ssl_sock_dump_errors(struct connection *conn)
+{
+	unsigned long ret;
+
+	if (unlikely(global.mode & MODE_DEBUG)) {
+		while(1) {
+			ret = ERR_get_error();
+			if (ret == 0)
+				return;
+			fprintf(stderr, "fd[%04x] OpenSSL error[0x%lx] %s: %s\n",
+			        (unsigned short)conn->t.sock.fd, ret,
+			        ERR_func_error_string(ret), ERR_reason_error_string(ret));
+		}
+	}
+}
+
 #if (defined SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB && !defined OPENSSL_NO_OCSP)
 /*
  * struct alignment works here such that the key.key is the same as key_data
@@ -243,27 +263,6 @@
 };
 
 /*
- * This function gives the detail of the SSL error. It is used only
- * if the debug mode and the verbose mode are activated. It dump all
- * the SSL error until the stack was empty.
- */
-static forceinline void ssl_sock_dump_errors(struct connection *conn)
-{
-	unsigned long ret;
-
-	if (unlikely(global.mode & MODE_DEBUG)) {
-		while(1) {
-			ret = ERR_get_error();
-			if (ret == 0)
-				return;
-			fprintf(stderr, "fd[%04x] OpenSSL error[0x%lx] %s: %s\n",
-			        (unsigned short)conn->t.sock.fd, ret,
-			        ERR_func_error_string(ret), ERR_reason_error_string(ret));
-		}
-	}
-}
-
-/*
  *  This function returns the number of seconds  elapsed
  *  since the Epoch, 1970-01-01 00:00:00 +0000 (UTC) and the
  *  date presented un ASN1_GENERALIZEDTIME.
@@ -532,6 +531,7 @@
 
 	return ret;
 }
+#endif
 
 #if (defined SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB && TLS_TICKETS_NO > 0)
 static int ssl_tlsext_ticket_key_cb(SSL *s, unsigned char key_name[16], unsigned char *iv, EVP_CIPHER_CTX *ectx, HMAC_CTX *hctx, int enc)
@@ -655,9 +655,9 @@
 	LIST_DEL(&tkr);
 	return 0;
 }
-
 #endif /* SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB */
 
+#ifndef OPENSSL_NO_OCSP
 int ssl_sock_get_ocsp_arg_kt_index(int evp_keytype)
 {
 	switch (evp_keytype) {
@@ -1212,6 +1212,7 @@
 #endif
 
 #ifdef SSL_CTRL_SET_TLSEXT_HOSTNAME
+#ifndef SSL_NO_GENERATE_CERTIFICATES
 static DH *ssl_get_tmp_dh(SSL *ssl, int export, int keylen);
 
 /* Create a X509 certificate with the specified servername and serial. This
@@ -1432,21 +1433,24 @@
 	}
 	return ssl_ctx;
 }
+#endif /* !defined SSL_NO_GENERATE_CERTIFICATES */
 
 /* Sets the SSL ctx of <ssl> to match the advertised server name. Returns a
  * warning when no match is found, which implies the default (first) cert
  * will keep being used.
  */
-static int ssl_sock_switchctx_cbk(SSL *ssl, int *al, struct bind_conf *s)
+static int ssl_sock_switchctx_cbk(SSL *ssl, int *al, void *priv)
 {
 	const char *servername;
 	const char *wildp = NULL;
 	struct ebmb_node *node, *n;
+	struct bind_conf *s = priv;
 	int i;
 	(void)al; /* shut gcc stupid warning */
 
 	servername = SSL_get_servername(ssl, TLSEXT_NAMETYPE_host_name);
 	if (!servername) {
+#if (!defined SSL_NO_GENERATE_CERTIFICATES)
 		if (s->generate_certs) {
 			struct connection *conn = SSL_get_app_data(ssl);
 			unsigned int key;
@@ -1463,7 +1467,7 @@
 				}
 			}
 		}
-
+#endif
 		return (s->strict_sni ?
 			SSL_TLSEXT_ERR_ALERT_FATAL :
 			SSL_TLSEXT_ERR_NOACK);
@@ -1493,12 +1497,14 @@
 		node = ebst_lookup(&s->sni_w_ctx, wildp);
 	}
 	if (!node || container_of(node, struct sni_ctx, name)->neg) {
+#if (!defined SSL_NO_GENERATE_CERTIFICATES)
 		SSL_CTX *ctx;
 		if (s->generate_certs &&
 		    (ctx = ssl_sock_generate_certificate(servername, s, ssl))) {
 			/* switch ctx */
 			return SSL_TLSEXT_ERR_OK;
 		}
+#endif
 		return (s->strict_sni ?
 			SSL_TLSEXT_ERR_ALERT_FATAL :
 			SSL_TLSEXT_ERR_ALERT_WARNING);
@@ -2840,7 +2846,7 @@
 		SSL_MODE_RELEASE_BUFFERS |
 		SSL_MODE_SMALL_BUFFERS;
 	STACK_OF(SSL_CIPHER) * ciphers = NULL;
-	SSL_CIPHER * cipher = NULL;
+	const SSL_CIPHER * cipher = NULL;
 	char cipher_description[128];
 	/* The description of ciphers using an Ephemeral Diffie Hellman key exchange
 	   contains " Kx=DH " or " Kx=DH(". Beware of " Kx=DH/",
@@ -2871,6 +2877,7 @@
 		ssloptions |= SSL_OP_NO_TLSv1_2;
 	if (conf_ssl_options & BC_SSL_O_NO_TLS_TICKETS)
 		ssloptions |= SSL_OP_NO_TICKET;
+#ifndef OPENSSL_IS_BORINGSSL
 	if (conf_ssl_options & BC_SSL_O_USE_SSLV3) {
 #ifndef OPENSSL_NO_SSL3
 		SSL_CTX_set_ssl_version(ctx, SSLv3_server_method());
@@ -2889,7 +2896,7 @@
 	if (conf_ssl_options & BC_SSL_O_USE_TLSV12)
 		SSL_CTX_set_ssl_version(ctx, TLSv1_2_server_method());
 #endif
-
+#endif
 	SSL_CTX_set_options(ctx, ssloptions);
 	SSL_CTX_set_mode(ctx, sslmode);
 	switch ((ssl_conf && ssl_conf->verify) ? ssl_conf->verify : bind_conf->ssl_conf.verify) {
@@ -2938,7 +2945,6 @@
 #endif
 		ERR_clear_error();
 	}
-
 #if (defined SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB && TLS_TICKETS_NO > 0)
 	if(bind_conf->keys_ref) {
 		if (!SSL_CTX_set_tlsext_ticket_key_cb(ctx, ssl_tlsext_ticket_key_cb)) {
@@ -3276,6 +3282,7 @@
 		options |= SSL_OP_NO_TLSv1_2;
 	if (srv->ssl_ctx.options & SRV_SSL_O_NO_TLS_TICKETS)
 		options |= SSL_OP_NO_TICKET;
+#ifndef OPENSSL_IS_BORINGSSL
 	if (srv->ssl_ctx.options & SRV_SSL_O_USE_SSLV3) {
 #ifndef OPENSSL_NO_SSL3
 		SSL_CTX_set_ssl_version(srv->ssl_ctx.ctx, SSLv3_client_method());
@@ -3294,7 +3301,7 @@
 	if (srv->ssl_ctx.options & SRV_SSL_O_USE_TLSV12)
 		SSL_CTX_set_ssl_version(srv->ssl_ctx.ctx, TLSv1_2_client_method());
 #endif
-
+#endif
 	SSL_CTX_set_options(srv->ssl_ctx.ctx, options);
 	SSL_CTX_set_mode(srv->ssl_ctx.ctx, mode);
 
@@ -3532,7 +3539,7 @@
 	if (!bind_conf || !bind_conf->generate_certs)
 		return err;
 
-#ifdef SSL_CTRL_SET_TLSEXT_HOSTNAME
+#if (defined SSL_CTRL_SET_TLSEXT_HOSTNAME && !defined SSL_NO_GENERATE_CERTIFICATES)
 	if (global_ssl.ctx_cache)
 		ssl_ctx_lru_tree = lru64_new(global_ssl.ctx_cache);
 	ssl_ctx_lru_seed = (unsigned int)time(NULL);
@@ -3780,6 +3787,9 @@
 				if (!errno && conn->flags & CO_FL_WAIT_L4_CONN)
 					conn->flags &= ~CO_FL_WAIT_L4_CONN;
 				if (!conn->err_code) {
+#ifdef OPENSSL_NO_HEARTBEATS  /* BoringSSL */
+					conn->err_code = CO_ER_SSL_HANDSHAKE;
+#else
 					int empty_handshake;
 #if (OPENSSL_VERSION_NUMBER >= 0x1010000fL) && !defined(LIBRESSL_VERSION_NUMBER)
 					OSSL_HANDSHAKE_STATE state = SSL_get_state((SSL *)conn->xprt_ctx);
@@ -3787,7 +3797,6 @@
 #else
 					empty_handshake = !((SSL *)conn->xprt_ctx)->packet_length;
 #endif
-
 					if (empty_handshake) {
 						if (!errno) {
 							if (conn->xprt_st & SSL_SOCK_RECV_HEARTBEAT)
@@ -3808,6 +3817,7 @@
 						else
 							conn->err_code = CO_ER_SSL_HANDSHAKE;
 					}
+#endif
 				}
 				goto out_error;
 			}
@@ -3851,39 +3861,41 @@
 			return 0;
 		}
 		else if (ret == SSL_ERROR_SYSCALL) {
-#if (OPENSSL_VERSION_NUMBER >= 0x1010000fL) && !defined(LIBRESSL_VERSION_NUMBER)
-			OSSL_HANDSHAKE_STATE state;
-#endif
-			int empty_handshake;
 			/* if errno is null, then connection was successfully established */
 			if (!errno && conn->flags & CO_FL_WAIT_L4_CONN)
 				conn->flags &= ~CO_FL_WAIT_L4_CONN;
-
+			if (!conn->err_code) {
+#ifdef OPENSSL_NO_HEARTBEATS  /* BoringSSL */
+				conn->err_code = CO_ER_SSL_HANDSHAKE;
+#else
+				int empty_handshake;
 #if (OPENSSL_VERSION_NUMBER >= 0x1010000fL) && !defined(LIBRESSL_VERSION_NUMBER)
-			state = SSL_get_state((SSL *)conn->xprt_ctx);
-			empty_handshake = state == TLS_ST_BEFORE;
+				OSSL_HANDSHAKE_STATE state = SSL_get_state((SSL *)conn->xprt_ctx);
+				empty_handshake = state == TLS_ST_BEFORE;
 #else
-			empty_handshake = !((SSL *)conn->xprt_ctx)->packet_length;
+				empty_handshake = !((SSL *)conn->xprt_ctx)->packet_length;
 #endif
-			if (empty_handshake) {
-				if (!errno) {
-					if (conn->xprt_st & SSL_SOCK_RECV_HEARTBEAT)
-						conn->err_code = CO_ER_SSL_HANDSHAKE_HB;
-					else
-						conn->err_code = CO_ER_SSL_EMPTY;
+				if (empty_handshake) {
+					if (!errno) {
+						if (conn->xprt_st & SSL_SOCK_RECV_HEARTBEAT)
+							conn->err_code = CO_ER_SSL_HANDSHAKE_HB;
+						else
+							conn->err_code = CO_ER_SSL_EMPTY;
+					}
+					else {
+						if (conn->xprt_st & SSL_SOCK_RECV_HEARTBEAT)
+							conn->err_code = CO_ER_SSL_HANDSHAKE_HB;
+						else
+							conn->err_code = CO_ER_SSL_ABORT;
+					}
 				}
 				else {
 					if (conn->xprt_st & SSL_SOCK_RECV_HEARTBEAT)
 						conn->err_code = CO_ER_SSL_HANDSHAKE_HB;
 					else
-						conn->err_code = CO_ER_SSL_ABORT;
+						conn->err_code = CO_ER_SSL_HANDSHAKE;
 				}
-			}
-			else {
-				if (conn->xprt_st & SSL_SOCK_RECV_HEARTBEAT)
-					conn->err_code = CO_ER_SSL_HANDSHAKE_HB;
-				else
-					conn->err_code = CO_ER_SSL_HANDSHAKE;
+#endif
 			}
 			goto out_error;
 		}
@@ -5855,7 +5867,7 @@
 /* parse the "generate-certificates" bind keyword */
 static int bind_parse_generate_certs(char **args, int cur_arg, struct proxy *px, struct bind_conf *conf, char **err)
 {
-#ifdef SSL_CTRL_SET_TLSEXT_HOSTNAME
+#if (defined SSL_CTRL_SET_TLSEXT_HOSTNAME && !defined SSL_NO_GENERATE_CERTIFICATES)
 	conf->generate_certs = 1;
 #else
 	memprintf(err, "%sthis version of openssl cannot generate SSL certificates.\n",
@@ -6664,8 +6676,6 @@
 	return 0;
 }
 
-#endif
-
 /* sets cli.i0 to non-zero if only file lists should be dumped */
 static int cli_parse_show_tlskeys(char **args, struct appctx *appctx, void *private)
 {
@@ -6691,7 +6701,6 @@
 	return 0;
 }
 
-
 static int cli_parse_set_tlskeys(char **args, struct appctx *appctx, void *private)
 {
 	struct tls_keys_ref *ref;
@@ -6725,6 +6734,7 @@
 	return 1;
 
 }
+#endif
 
 static int cli_parse_set_ocspresponse(char **args, struct appctx *appctx, void *private)
 {
@@ -6769,13 +6779,12 @@
 #if (defined SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB && TLS_TICKETS_NO > 0)
 	{ { "show", "tls-keys", NULL }, "show tls-keys [id|*]: show tls keys references or dump tls ticket keys when id specified", cli_parse_show_tlskeys, NULL },
 	{ { "set", "ssl", "tls-keys", NULL }, NULL, cli_parse_set_tlskeys, NULL },
-	{ { "set", "ssl", "ocsp-response", NULL }, NULL, cli_parse_set_ocspresponse, NULL },
 #endif
+	{ { "set", "ssl", "ocsp-response", NULL }, NULL, cli_parse_set_ocspresponse, NULL },
 	{ { NULL }, NULL, NULL, NULL }
 }};
 
 
-
 /* Note: must not be declared <const> as its list will be overwritten.
  * Please take care of keeping this list alphabetically sorted.
  */
@@ -7060,7 +7069,7 @@
 __attribute__((destructor))
 static void __ssl_sock_deinit(void)
 {
-#ifdef SSL_CTRL_SET_TLSEXT_HOSTNAME
+#if (defined SSL_CTRL_SET_TLSEXT_HOSTNAME && !defined SSL_NO_GENERATE_CERTIFICATES)
 	lru64_destroy(ssl_ctx_lru_tree);
 #endif