Emeric Brun | 4659195 | 2012-05-18 15:47:34 +0200 | [diff] [blame] | 1 | /* |
| 2 | * include/proto/ssl_sock.h |
| 3 | * This file contains definition for ssl stream socket operations |
| 4 | * |
| 5 | * Copyright (C) 2012 EXCELIANCE, Emeric Brun <ebrun@exceliance.fr> |
| 6 | * |
| 7 | * This library is free software; you can redistribute it and/or |
| 8 | * modify it under the terms of the GNU Lesser General Public |
| 9 | * License as published by the Free Software Foundation, version 2.1 |
| 10 | * exclusively. |
| 11 | * |
| 12 | * This library is distributed in the hope that it will be useful, |
| 13 | * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 14 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| 15 | * Lesser General Public License for more details. |
| 16 | * |
| 17 | * You should have received a copy of the GNU Lesser General Public |
| 18 | * License along with this library; if not, write to the Free Software |
| 19 | * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA |
| 20 | */ |
| 21 | |
| 22 | #ifndef _PROTO_SSL_SOCK_H |
| 23 | #define _PROTO_SSL_SOCK_H |
Willy Tarreau | c125cef | 2019-05-10 09:58:43 +0200 | [diff] [blame] | 24 | #ifdef USE_OPENSSL |
| 25 | |
Willy Tarreau | 8d164dc | 2019-05-10 09:35:00 +0200 | [diff] [blame] | 26 | #include <common/openssl-compat.h> |
Emeric Brun | 4659195 | 2012-05-18 15:47:34 +0200 | [diff] [blame] | 27 | |
Willy Tarreau | d1d5454 | 2012-09-12 22:58:11 +0200 | [diff] [blame] | 28 | #include <types/connection.h> |
| 29 | #include <types/listener.h> |
| 30 | #include <types/proxy.h> |
William Lallemand | c0cdaff | 2020-05-15 00:20:53 +0200 | [diff] [blame] | 31 | #include <types/ssl_sock.h> |
Emeric Brun | 4659195 | 2012-05-18 15:47:34 +0200 | [diff] [blame] | 32 | #include <types/stream_interface.h> |
| 33 | |
Willy Tarreau | c125cef | 2019-05-10 09:58:43 +0200 | [diff] [blame] | 34 | #include <proto/connection.h> |
| 35 | |
Willy Tarreau | 71b734c | 2014-01-28 15:19:44 +0100 | [diff] [blame] | 36 | extern int sslconns; |
| 37 | extern int totalsslconns; |
William Lallemand | 03c331c | 2020-05-13 10:10:01 +0200 | [diff] [blame] | 38 | extern struct eb_root ckchs_tree; |
William Lallemand | c756bbd | 2020-05-13 17:23:59 +0200 | [diff] [blame] | 39 | extern struct eb_root crtlists_tree; |
William Lallemand | 03c331c | 2020-05-13 10:10:01 +0200 | [diff] [blame] | 40 | extern int sctl_ex_index; |
William Lallemand | d4632b2 | 2020-05-12 14:46:24 +0200 | [diff] [blame] | 41 | extern struct global_ssl global_ssl; |
| 42 | extern struct ssl_bind_kw ssl_bind_kws[]; |
William Lallemand | c756bbd | 2020-05-13 17:23:59 +0200 | [diff] [blame] | 43 | extern struct methodVersions methodVersions[]; |
| 44 | __decl_hathreads(extern HA_SPINLOCK_T ckch_lock); |
William Lallemand | dad3105 | 2020-05-14 17:47:32 +0200 | [diff] [blame] | 45 | extern struct pool_head *pool_head_ssl_capture; |
| 46 | extern unsigned int openssl_engines_initialized; |
| 47 | extern int nb_engines; |
| 48 | extern struct xprt_ops ssl_sock; |
William Lallemand | 15e1694 | 2020-05-15 00:25:08 +0200 | [diff] [blame] | 49 | extern int ssl_capture_ptr_index; |
Willy Tarreau | 71b734c | 2014-01-28 15:19:44 +0100 | [diff] [blame] | 50 | |
David S | afb7683 | 2014-05-08 23:42:08 -0400 | [diff] [blame] | 51 | /* boolean, returns true if connection is over SSL */ |
| 52 | static inline |
| 53 | int ssl_sock_is_ssl(struct connection *conn) |
| 54 | { |
Willy Tarreau | d9f5cca | 2016-12-22 21:08:52 +0100 | [diff] [blame] | 55 | if (!conn || conn->xprt != xprt_get(XPRT_SSL) || !conn->xprt_ctx) |
David S | afb7683 | 2014-05-08 23:42:08 -0400 | [diff] [blame] | 56 | return 0; |
| 57 | else |
| 58 | return 1; |
| 59 | } |
| 60 | |
William Lallemand | 8b45391 | 2019-11-21 15:48:10 +0100 | [diff] [blame] | 61 | int ssl_sock_prepare_ctx(struct bind_conf *bind_conf, struct ssl_bind_conf *, SSL_CTX *ctx, char **err); |
Willy Tarreau | 0320934 | 2016-12-22 17:08:28 +0100 | [diff] [blame] | 62 | int ssl_sock_prepare_all_ctx(struct bind_conf *bind_conf); |
Willy Tarreau | 55d3791 | 2016-12-21 23:38:39 +0100 | [diff] [blame] | 63 | int ssl_sock_prepare_bind_conf(struct bind_conf *bind_conf); |
Willy Tarreau | 0320934 | 2016-12-22 17:08:28 +0100 | [diff] [blame] | 64 | int ssl_sock_prepare_srv_ctx(struct server *srv); |
Christopher Faulet | 77fe80c | 2015-07-29 13:02:40 +0200 | [diff] [blame] | 65 | void ssl_sock_free_srv_ctx(struct server *srv); |
Willy Tarreau | 2a65ff0 | 2012-09-13 17:54:29 +0200 | [diff] [blame] | 66 | void ssl_sock_free_all_ctx(struct bind_conf *bind_conf); |
Willy Tarreau | 0320934 | 2016-12-22 17:08:28 +0100 | [diff] [blame] | 67 | int ssl_sock_load_ca(struct bind_conf *bind_conf); |
Christopher Faulet | 31af49d | 2015-06-09 17:29:50 +0200 | [diff] [blame] | 68 | void ssl_sock_free_ca(struct bind_conf *bind_conf); |
Emmanuel Hocdet | 253c3b7 | 2018-02-01 18:29:59 +0100 | [diff] [blame] | 69 | const char *ssl_sock_get_sni(struct connection *conn); |
Emmanuel Hocdet | 283e004 | 2017-11-02 14:05:23 +0100 | [diff] [blame] | 70 | const char *ssl_sock_get_cert_sig(struct connection *conn); |
Willy Tarreau | ffc3fcd | 2012-10-12 20:17:54 +0200 | [diff] [blame] | 71 | const char *ssl_sock_get_cipher_name(struct connection *conn); |
| 72 | const char *ssl_sock_get_proto_version(struct connection *conn); |
Christopher Faulet | d75f57e | 2020-04-20 18:32:29 +0200 | [diff] [blame] | 73 | int ssl_sock_parse_alpn(char *arg, char **alpn_str, int *alpn_len, char **err); |
Olivier Houchard | ab28a32 | 2018-12-21 19:45:40 +0100 | [diff] [blame] | 74 | void ssl_sock_set_alpn(struct connection *conn, const unsigned char *, int); |
Willy Tarreau | 6307641 | 2015-07-10 11:33:32 +0200 | [diff] [blame] | 75 | void ssl_sock_set_servername(struct connection *conn, const char *hostname); |
Olivier Houchard | ab28a32 | 2018-12-21 19:45:40 +0100 | [diff] [blame] | 76 | |
Dave McCowan | 328fb58 | 2014-07-30 10:39:13 -0400 | [diff] [blame] | 77 | int ssl_sock_get_cert_used_sess(struct connection *conn); |
| 78 | int ssl_sock_get_cert_used_conn(struct connection *conn); |
Willy Tarreau | 83061a8 | 2018-07-13 11:56:34 +0200 | [diff] [blame] | 79 | int ssl_sock_get_remote_common_name(struct connection *conn, |
| 80 | struct buffer *out); |
| 81 | int ssl_sock_get_pkey_algo(struct connection *conn, struct buffer *out); |
David S | afb7683 | 2014-05-08 23:42:08 -0400 | [diff] [blame] | 82 | unsigned int ssl_sock_get_verify_result(struct connection *conn); |
Lukas Tribus | e4e30f7 | 2014-12-09 16:32:51 +0100 | [diff] [blame] | 83 | #if (defined SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB && !defined OPENSSL_NO_OCSP) |
Willy Tarreau | 83061a8 | 2018-07-13 11:56:34 +0200 | [diff] [blame] | 84 | int ssl_sock_update_ocsp_response(struct buffer *ocsp_response, char **err); |
Emeric Brun | 4147b2e | 2014-06-16 18:36:30 +0200 | [diff] [blame] | 85 | #endif |
Nenad Merdanovic | 200b0fa | 2015-05-09 08:46:01 +0200 | [diff] [blame] | 86 | #if (defined SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB && TLS_TICKETS_NO > 0) |
Emeric Brun | 9e75477 | 2019-01-10 17:51:55 +0100 | [diff] [blame] | 87 | int ssl_sock_update_tlskey_ref(struct tls_keys_ref *ref, |
Willy Tarreau | 83061a8 | 2018-07-13 11:56:34 +0200 | [diff] [blame] | 88 | struct buffer *tlskey); |
| 89 | int ssl_sock_update_tlskey(char *filename, struct buffer *tlskey, char **err); |
Nenad Merdanovic | 200b0fa | 2015-05-09 08:46:01 +0200 | [diff] [blame] | 90 | struct tls_keys_ref *tlskeys_ref_lookup(const char *filename); |
| 91 | struct tls_keys_ref *tlskeys_ref_lookupid(int unique_id); |
Nenad Merdanovic | 200b0fa | 2015-05-09 08:46:01 +0200 | [diff] [blame] | 92 | #endif |
Remi Gacogne | 47783ef | 2015-05-29 15:53:22 +0200 | [diff] [blame] | 93 | #ifndef OPENSSL_NO_DH |
| 94 | int ssl_sock_load_global_dh_param_from_file(const char *filename); |
Grant Zhang | 872f9c2 | 2017-01-21 01:10:18 +0000 | [diff] [blame] | 95 | void ssl_free_dh(void); |
Remi Gacogne | 47783ef | 2015-05-29 15:53:22 +0200 | [diff] [blame] | 96 | #endif |
Grant Zhang | 872f9c2 | 2017-01-21 01:10:18 +0000 | [diff] [blame] | 97 | void ssl_free_engines(void); |
Emeric Brun | 4659195 | 2012-05-18 15:47:34 +0200 | [diff] [blame] | 98 | |
Christopher Faulet | 635c0ad | 2015-11-12 11:35:51 +0100 | [diff] [blame] | 99 | SSL_CTX *ssl_sock_create_cert(struct connection *conn, const char *servername, unsigned int key); |
Emeric Brun | 821bb9b | 2017-06-15 16:37:39 +0200 | [diff] [blame] | 100 | SSL_CTX *ssl_sock_assign_generated_cert(unsigned int key, struct bind_conf *bind_conf, SSL *ssl); |
Christopher Faulet | 635c0ad | 2015-11-12 11:35:51 +0100 | [diff] [blame] | 101 | SSL_CTX *ssl_sock_get_generated_cert(unsigned int key, struct bind_conf *bind_conf); |
| 102 | int ssl_sock_set_generated_cert(SSL_CTX *ctx, unsigned int key, struct bind_conf *bind_conf); |
| 103 | unsigned int ssl_sock_generated_cert_key(const void *data, size_t len); |
William Lallemand | c756bbd | 2020-05-13 17:23:59 +0200 | [diff] [blame] | 104 | void ssl_sock_load_cert_sni(struct ckch_inst *ckch_inst, struct bind_conf *bind_conf); |
Willy Tarreau | 9a1ab08 | 2019-05-09 13:26:41 +0200 | [diff] [blame] | 105 | #if (HA_OPENSSL_VERSION_NUMBER >= 0x1010000fL) && !defined(OPENSSL_NO_ASYNC) && !defined(LIBRESSL_VERSION_NUMBER) |
Emeric Brun | d0e095c | 2019-04-19 17:15:28 +0200 | [diff] [blame] | 106 | void ssl_async_fd_handler(int fd); |
| 107 | void ssl_async_fd_free(int fd); |
| 108 | #endif |
William Lallemand | da8584c | 2020-05-14 10:14:37 +0200 | [diff] [blame] | 109 | struct issuer_chain* ssl_get0_issuer_chain(X509 *cert); |
William Lallemand | dad3105 | 2020-05-14 17:47:32 +0200 | [diff] [blame] | 110 | int ssl_load_global_issuer_from_BIO(BIO *in, char *fp, char **err); |
| 111 | int ssl_sock_load_cert(char *path, struct bind_conf *bind_conf, char **err); |
| 112 | void ssl_free_global_issuers(void); |
| 113 | int ssl_sock_load_cert_list_file(char *file, int dir, struct bind_conf *bind_conf, struct proxy *curproxy, char **err); |
| 114 | int ssl_init_single_engine(const char *engine_id, const char *def_algorithms); |
| 115 | int ssl_store_load_locations_file(char *path); |
William Lallemand | ef76107 | 2020-05-15 09:52:16 +0200 | [diff] [blame] | 116 | |
William Lallemand | ed0b5ad | 2017-10-30 19:36:36 +0100 | [diff] [blame] | 117 | /* ssl shctx macro */ |
| 118 | |
William Lallemand | 4f45bb9 | 2017-10-30 20:08:51 +0100 | [diff] [blame] | 119 | #define sh_ssl_sess_tree_delete(s) ebmb_delete(&(s)->key); |
William Lallemand | ed0b5ad | 2017-10-30 19:36:36 +0100 | [diff] [blame] | 120 | |
William Lallemand | 4f45bb9 | 2017-10-30 20:08:51 +0100 | [diff] [blame] | 121 | #define sh_ssl_sess_tree_insert(s) (struct sh_ssl_sess_hdr *)ebmb_insert(sh_ssl_sess_tree, \ |
| 122 | &(s)->key, SSL_MAX_SSL_SESSION_ID_LENGTH); |
William Lallemand | ed0b5ad | 2017-10-30 19:36:36 +0100 | [diff] [blame] | 123 | |
William Lallemand | 4f45bb9 | 2017-10-30 20:08:51 +0100 | [diff] [blame] | 124 | #define sh_ssl_sess_tree_lookup(k) (struct sh_ssl_sess_hdr *)ebmb_lookup(sh_ssl_sess_tree, \ |
| 125 | (k), SSL_MAX_SSL_SESSION_ID_LENGTH); |
Dragan Dosen | 1e7ed04 | 2020-05-08 18:30:00 +0200 | [diff] [blame] | 126 | |
| 127 | /* Registers the function <func> in order to be called on SSL/TLS protocol |
| 128 | * message processing. |
| 129 | */ |
| 130 | int ssl_sock_register_msg_callback(ssl_sock_msg_callback_func func); |
| 131 | |
Dragan Dosen | eb607fe | 2020-05-11 17:17:06 +0200 | [diff] [blame] | 132 | SSL *ssl_sock_get_ssl_object(struct connection *conn); |
| 133 | |
Willy Tarreau | c125cef | 2019-05-10 09:58:43 +0200 | [diff] [blame] | 134 | #endif /* USE_OPENSSL */ |
Emeric Brun | 4659195 | 2012-05-18 15:47:34 +0200 | [diff] [blame] | 135 | #endif /* _PROTO_SSL_SOCK_H */ |
| 136 | |
| 137 | /* |
| 138 | * Local variables: |
| 139 | * c-indent-level: 8 |
| 140 | * c-basic-offset: 8 |
| 141 | * End: |
| 142 | */ |