blob: a01e29ef619828a27981c6a4ccec96239277f906 [file] [log] [blame]
Emeric Brun46591952012-05-18 15:47:34 +02001/*
2 * include/proto/ssl_sock.h
3 * This file contains definition for ssl stream socket operations
4 *
5 * Copyright (C) 2012 EXCELIANCE, Emeric Brun <ebrun@exceliance.fr>
6 *
7 * This library is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation, version 2.1
10 * exclusively.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with this library; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
20 */
21
22#ifndef _PROTO_SSL_SOCK_H
23#define _PROTO_SSL_SOCK_H
Willy Tarreauc125cef2019-05-10 09:58:43 +020024#ifdef USE_OPENSSL
25
Willy Tarreau8d164dc2019-05-10 09:35:00 +020026#include <common/openssl-compat.h>
Emeric Brun46591952012-05-18 15:47:34 +020027
Willy Tarreaud1d54542012-09-12 22:58:11 +020028#include <types/connection.h>
29#include <types/listener.h>
30#include <types/proxy.h>
Emeric Brun46591952012-05-18 15:47:34 +020031#include <types/stream_interface.h>
32
Willy Tarreauc125cef2019-05-10 09:58:43 +020033#include <proto/connection.h>
34
Willy Tarreau71b734c2014-01-28 15:19:44 +010035extern int sslconns;
36extern int totalsslconns;
William Lallemand03c331c2020-05-13 10:10:01 +020037extern struct eb_root ckchs_tree;
William Lallemandc756bbd2020-05-13 17:23:59 +020038extern struct eb_root crtlists_tree;
William Lallemand03c331c2020-05-13 10:10:01 +020039extern int sctl_ex_index;
William Lallemandd4632b22020-05-12 14:46:24 +020040extern struct global_ssl global_ssl;
41extern struct ssl_bind_kw ssl_bind_kws[];
William Lallemandc756bbd2020-05-13 17:23:59 +020042extern struct methodVersions methodVersions[];
43__decl_hathreads(extern HA_SPINLOCK_T ckch_lock);
William Lallemanddad31052020-05-14 17:47:32 +020044extern struct pool_head *pool_head_ssl_capture;
45extern unsigned int openssl_engines_initialized;
46extern int nb_engines;
47extern struct xprt_ops ssl_sock;
Willy Tarreau71b734c2014-01-28 15:19:44 +010048
David Safb76832014-05-08 23:42:08 -040049/* boolean, returns true if connection is over SSL */
50static inline
51int ssl_sock_is_ssl(struct connection *conn)
52{
Willy Tarreaud9f5cca2016-12-22 21:08:52 +010053 if (!conn || conn->xprt != xprt_get(XPRT_SSL) || !conn->xprt_ctx)
David Safb76832014-05-08 23:42:08 -040054 return 0;
55 else
56 return 1;
57}
58
William Lallemand8b453912019-11-21 15:48:10 +010059int ssl_sock_prepare_ctx(struct bind_conf *bind_conf, struct ssl_bind_conf *, SSL_CTX *ctx, char **err);
Willy Tarreau03209342016-12-22 17:08:28 +010060int ssl_sock_prepare_all_ctx(struct bind_conf *bind_conf);
Willy Tarreau55d37912016-12-21 23:38:39 +010061int ssl_sock_prepare_bind_conf(struct bind_conf *bind_conf);
Willy Tarreau03209342016-12-22 17:08:28 +010062int ssl_sock_prepare_srv_ctx(struct server *srv);
Christopher Faulet77fe80c2015-07-29 13:02:40 +020063void ssl_sock_free_srv_ctx(struct server *srv);
Willy Tarreau2a65ff02012-09-13 17:54:29 +020064void ssl_sock_free_all_ctx(struct bind_conf *bind_conf);
Willy Tarreau03209342016-12-22 17:08:28 +010065int ssl_sock_load_ca(struct bind_conf *bind_conf);
Christopher Faulet31af49d2015-06-09 17:29:50 +020066void ssl_sock_free_ca(struct bind_conf *bind_conf);
Emmanuel Hocdet253c3b72018-02-01 18:29:59 +010067const char *ssl_sock_get_sni(struct connection *conn);
Emmanuel Hocdet283e0042017-11-02 14:05:23 +010068const char *ssl_sock_get_cert_sig(struct connection *conn);
Willy Tarreauffc3fcd2012-10-12 20:17:54 +020069const char *ssl_sock_get_cipher_name(struct connection *conn);
70const char *ssl_sock_get_proto_version(struct connection *conn);
Christopher Fauletd75f57e2020-04-20 18:32:29 +020071int ssl_sock_parse_alpn(char *arg, char **alpn_str, int *alpn_len, char **err);
Olivier Houchardab28a322018-12-21 19:45:40 +010072void ssl_sock_set_alpn(struct connection *conn, const unsigned char *, int);
Willy Tarreau63076412015-07-10 11:33:32 +020073void ssl_sock_set_servername(struct connection *conn, const char *hostname);
Olivier Houchardab28a322018-12-21 19:45:40 +010074
Dave McCowan328fb582014-07-30 10:39:13 -040075int ssl_sock_get_cert_used_sess(struct connection *conn);
76int ssl_sock_get_cert_used_conn(struct connection *conn);
Willy Tarreau83061a82018-07-13 11:56:34 +020077int ssl_sock_get_remote_common_name(struct connection *conn,
78 struct buffer *out);
79int ssl_sock_get_pkey_algo(struct connection *conn, struct buffer *out);
David Safb76832014-05-08 23:42:08 -040080unsigned int ssl_sock_get_verify_result(struct connection *conn);
Lukas Tribuse4e30f72014-12-09 16:32:51 +010081#if (defined SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB && !defined OPENSSL_NO_OCSP)
Willy Tarreau83061a82018-07-13 11:56:34 +020082int ssl_sock_update_ocsp_response(struct buffer *ocsp_response, char **err);
Emeric Brun4147b2e2014-06-16 18:36:30 +020083#endif
Nenad Merdanovic200b0fa2015-05-09 08:46:01 +020084#if (defined SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB && TLS_TICKETS_NO > 0)
Emeric Brun9e754772019-01-10 17:51:55 +010085int ssl_sock_update_tlskey_ref(struct tls_keys_ref *ref,
Willy Tarreau83061a82018-07-13 11:56:34 +020086 struct buffer *tlskey);
87int ssl_sock_update_tlskey(char *filename, struct buffer *tlskey, char **err);
Nenad Merdanovic200b0fa2015-05-09 08:46:01 +020088struct tls_keys_ref *tlskeys_ref_lookup(const char *filename);
89struct tls_keys_ref *tlskeys_ref_lookupid(int unique_id);
Nenad Merdanovic200b0fa2015-05-09 08:46:01 +020090#endif
Remi Gacogne47783ef2015-05-29 15:53:22 +020091#ifndef OPENSSL_NO_DH
92int ssl_sock_load_global_dh_param_from_file(const char *filename);
Grant Zhang872f9c22017-01-21 01:10:18 +000093void ssl_free_dh(void);
Remi Gacogne47783ef2015-05-29 15:53:22 +020094#endif
Grant Zhang872f9c22017-01-21 01:10:18 +000095void ssl_free_engines(void);
Emeric Brun46591952012-05-18 15:47:34 +020096
Christopher Faulet635c0ad2015-11-12 11:35:51 +010097SSL_CTX *ssl_sock_create_cert(struct connection *conn, const char *servername, unsigned int key);
Emeric Brun821bb9b2017-06-15 16:37:39 +020098SSL_CTX *ssl_sock_assign_generated_cert(unsigned int key, struct bind_conf *bind_conf, SSL *ssl);
Christopher Faulet635c0ad2015-11-12 11:35:51 +010099SSL_CTX *ssl_sock_get_generated_cert(unsigned int key, struct bind_conf *bind_conf);
100int ssl_sock_set_generated_cert(SSL_CTX *ctx, unsigned int key, struct bind_conf *bind_conf);
101unsigned int ssl_sock_generated_cert_key(const void *data, size_t len);
William Lallemandc756bbd2020-05-13 17:23:59 +0200102void ssl_sock_load_cert_sni(struct ckch_inst *ckch_inst, struct bind_conf *bind_conf);
Willy Tarreau9a1ab082019-05-09 13:26:41 +0200103#if (HA_OPENSSL_VERSION_NUMBER >= 0x1010000fL) && !defined(OPENSSL_NO_ASYNC) && !defined(LIBRESSL_VERSION_NUMBER)
Emeric Brund0e095c2019-04-19 17:15:28 +0200104void ssl_async_fd_handler(int fd);
105void ssl_async_fd_free(int fd);
106#endif
William Lallemandda8584c2020-05-14 10:14:37 +0200107struct issuer_chain* ssl_get0_issuer_chain(X509 *cert);
108int ssl_sock_get_dn_oneline(X509_NAME *a, struct buffer *out);
109int ssl_sock_get_serial(X509 *crt, struct buffer *out);
110int cert_get_pkey_algo(X509 *crt, struct buffer *out);
William Lallemanddad31052020-05-14 17:47:32 +0200111int ssl_load_global_issuer_from_BIO(BIO *in, char *fp, char **err);
112int ssl_sock_load_cert(char *path, struct bind_conf *bind_conf, char **err);
113void ssl_free_global_issuers(void);
114int ssl_sock_load_cert_list_file(char *file, int dir, struct bind_conf *bind_conf, struct proxy *curproxy, char **err);
115int ssl_init_single_engine(const char *engine_id, const char *def_algorithms);
116int ssl_store_load_locations_file(char *path);
William Lallemandef761072020-05-15 09:52:16 +0200117int ssl_sock_crt2der(X509 *crt, struct buffer *out);
118int ssl_sock_get_time(ASN1_TIME *tm, struct buffer *out);
119int ssl_sock_get_dn_formatted(X509_NAME *a, const struct buffer *format, struct buffer *out);
120int ssl_sock_get_dn_entry(X509_NAME *a, const struct buffer *entry, int pos,
121 struct buffer *out);
122
William Lallemanded0b5ad2017-10-30 19:36:36 +0100123/* ssl shctx macro */
124
William Lallemand4f45bb92017-10-30 20:08:51 +0100125#define sh_ssl_sess_tree_delete(s) ebmb_delete(&(s)->key);
William Lallemanded0b5ad2017-10-30 19:36:36 +0100126
William Lallemand4f45bb92017-10-30 20:08:51 +0100127#define sh_ssl_sess_tree_insert(s) (struct sh_ssl_sess_hdr *)ebmb_insert(sh_ssl_sess_tree, \
128 &(s)->key, SSL_MAX_SSL_SESSION_ID_LENGTH);
William Lallemanded0b5ad2017-10-30 19:36:36 +0100129
William Lallemand4f45bb92017-10-30 20:08:51 +0100130#define sh_ssl_sess_tree_lookup(k) (struct sh_ssl_sess_hdr *)ebmb_lookup(sh_ssl_sess_tree, \
131 (k), SSL_MAX_SSL_SESSION_ID_LENGTH);
Dragan Dosen1e7ed042020-05-08 18:30:00 +0200132
133/* Registers the function <func> in order to be called on SSL/TLS protocol
134 * message processing.
135 */
136int ssl_sock_register_msg_callback(ssl_sock_msg_callback_func func);
137
Dragan Doseneb607fe2020-05-11 17:17:06 +0200138SSL *ssl_sock_get_ssl_object(struct connection *conn);
139
Willy Tarreauc125cef2019-05-10 09:58:43 +0200140#endif /* USE_OPENSSL */
Emeric Brun46591952012-05-18 15:47:34 +0200141#endif /* _PROTO_SSL_SOCK_H */
142
143/*
144 * Local variables:
145 * c-indent-level: 8
146 * c-basic-offset: 8
147 * End:
148 */