Coverage Report

Created: 2026-02-26 06:32

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/curl/lib/vtls/vtls_scache.c
Line
Count
Source
1
/***************************************************************************
2
 *                                  _   _ ____  _
3
 *  Project                     ___| | | |  _ \| |
4
 *                             / __| | | | |_) | |
5
 *                            | (__| |_| |  _ <| |___
6
 *                             \___|\___/|_| \_\_____|
7
 *
8
 * Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
9
 *
10
 * This software is licensed as described in the file COPYING, which
11
 * you should have received as part of this distribution. The terms
12
 * are also available at https://curl.se/docs/copyright.html.
13
 *
14
 * You may opt to use, copy, modify, merge, publish, distribute and/or sell
15
 * copies of the Software, and permit persons to whom the Software is
16
 * furnished to do so, under the terms of the COPYING file.
17
 *
18
 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
19
 * KIND, either express or implied.
20
 *
21
 * SPDX-License-Identifier: curl
22
 *
23
 ***************************************************************************/
24
#include "curl_setup.h"
25
26
#ifdef USE_SSL
27
28
#ifdef HAVE_SYS_TYPES_H
29
#include <sys/types.h>
30
#endif
31
32
#include "urldata.h"
33
#include "cfilters.h"
34
35
#include "vtls/vtls.h" /* generic SSL protos etc */
36
#include "vtls/vtls_int.h"
37
#include "vtls/vtls_scache.h"
38
#include "vtls/vtls_spack.h"
39
40
#include "strcase.h"
41
#include "url.h"
42
#include "llist.h"
43
#include "curl_share.h"
44
#include "curl_trc.h"
45
#include "curl_sha256.h"
46
#include "rand.h"
47
48
49
/* a peer+tls-config we cache sessions for */
50
struct Curl_ssl_scache_peer {
51
  char *ssl_peer_key;      /* id for peer + relevant TLS configuration */
52
  char *clientcert;
53
  char *srp_username;
54
  char *srp_password;
55
  struct Curl_llist sessions;
56
  void *sobj;              /* object instance or NULL */
57
  Curl_ssl_scache_obj_dtor *sobj_free; /* free `sobj` callback */
58
  unsigned char key_salt[CURL_SHA256_DIGEST_LENGTH]; /* for entry export */
59
  unsigned char key_hmac[CURL_SHA256_DIGEST_LENGTH]; /* for entry export */
60
  size_t max_sessions;
61
  long age;                /* just a number, the higher the more recent */
62
  BIT(hmac_set);           /* if key_salt and key_hmac are present */
63
  BIT(exportable);         /* sessions for this peer can be exported */
64
};
65
66
0
#define CURL_SCACHE_MAGIC 0x000e1551
67
68
0
#define GOOD_SCACHE(x) ((x) && (x)->magic == CURL_SCACHE_MAGIC)
69
70
static CURLcode cf_ssl_peer_key_add_path(struct dynbuf *buf,
71
                                         const char *name,
72
                                         const char *path,
73
                                         bool *is_local)
74
0
{
75
0
  if(path && path[0]) {
76
    /* We try to add absolute paths, so that the session key can stay
77
     * valid when used in another process with different CWD. However,
78
     * when a path does not exist, this does not work. Then, we add
79
     * the path as is. */
80
#ifdef _WIN32
81
    char abspath[_MAX_PATH];
82
    if(_fullpath(abspath, path, _MAX_PATH))
83
      return curlx_dyn_addf(buf, ":%s-%s", name, abspath);
84
    *is_local = TRUE;
85
#elif defined(HAVE_REALPATH)
86
0
    if(path[0] != '/') {
87
0
      char *abspath = realpath(path, NULL);
88
0
      if(abspath) {
89
0
        CURLcode r = curlx_dyn_addf(buf, ":%s-%s", name, abspath);
90
        /* !checksrc! disable BANNEDFUNC 1 */
91
0
        free(abspath); /* allocated by libc, free without memdebug */
92
0
        return r;
93
0
      }
94
0
      *is_local = TRUE;
95
0
    }
96
0
#endif
97
0
    return curlx_dyn_addf(buf, ":%s-%s", name, path);
98
0
  }
99
0
  return CURLE_OK;
100
0
}
101
102
static CURLcode cf_ssl_peer_key_add_hash(struct dynbuf *buf,
103
                                         const char *name,
104
                                         struct curl_blob *blob)
105
0
{
106
0
  CURLcode r = CURLE_OK;
107
0
  if(blob && blob->len) {
108
0
    unsigned char hash[CURL_SHA256_DIGEST_LENGTH];
109
0
    size_t i;
110
111
0
    r = curlx_dyn_addf(buf, ":%s-", name);
112
0
    if(r)
113
0
      goto out;
114
0
    r = Curl_sha256it(hash, blob->data, blob->len);
115
0
    if(r)
116
0
      goto out;
117
0
    for(i = 0; i < CURL_SHA256_DIGEST_LENGTH; ++i) {
118
0
      r = curlx_dyn_addf(buf, "%02x", hash[i]);
119
0
      if(r)
120
0
        goto out;
121
0
    }
122
0
  }
123
0
out:
124
0
  return r;
125
0
}
126
127
0
#define CURL_SSLS_LOCAL_SUFFIX     ":L"
128
0
#define CURL_SSLS_GLOBAL_SUFFIX    ":G"
129
130
static bool cf_ssl_peer_key_is_global(const char *peer_key)
131
0
{
132
0
  size_t len = peer_key ? strlen(peer_key) : 0;
133
0
  return (len > 2) &&
134
0
         (peer_key[len - 1] == 'G') &&
135
0
         (peer_key[len - 2] == ':');
136
0
}
137
138
CURLcode Curl_ssl_peer_key_make(struct Curl_cfilter *cf,
139
                                const struct ssl_peer *peer,
140
                                const char *tls_id,
141
                                char **ppeer_key)
142
0
{
143
0
  struct ssl_primary_config *ssl = Curl_ssl_cf_get_primary_config(cf);
144
0
  struct dynbuf buf;
145
0
  size_t key_len;
146
0
  bool is_local = FALSE;
147
0
  CURLcode r;
148
149
0
  *ppeer_key = NULL;
150
0
  curlx_dyn_init(&buf, 10 * 1024);
151
152
0
  r = curlx_dyn_addf(&buf, "%s:%d", peer->hostname, peer->port);
153
0
  if(r)
154
0
    goto out;
155
156
0
  switch(peer->transport) {
157
0
  case TRNSPRT_TCP:
158
0
    break;
159
0
  case TRNSPRT_UDP:
160
0
    r = curlx_dyn_add(&buf, ":UDP");
161
0
    break;
162
0
  case TRNSPRT_QUIC:
163
0
    r = curlx_dyn_add(&buf, ":QUIC");
164
0
    break;
165
0
  case TRNSPRT_UNIX:
166
0
    r = curlx_dyn_add(&buf, ":UNIX");
167
0
    break;
168
0
  default:
169
0
    r = curlx_dyn_addf(&buf, ":TRNSPRT-%d", peer->transport);
170
0
    break;
171
0
  }
172
0
  if(r)
173
0
    goto out;
174
175
0
  if(!ssl->verifypeer) {
176
0
    r = curlx_dyn_add(&buf, ":NO-VRFY-PEER");
177
0
    if(r)
178
0
      goto out;
179
0
  }
180
0
  if(!ssl->verifyhost) {
181
0
    r = curlx_dyn_add(&buf, ":NO-VRFY-HOST");
182
0
    if(r)
183
0
      goto out;
184
0
  }
185
0
  if(ssl->verifystatus) {
186
0
    r = curlx_dyn_add(&buf, ":VRFY-STATUS");
187
0
    if(r)
188
0
      goto out;
189
0
  }
190
0
  if(!ssl->verifypeer || !ssl->verifyhost) {
191
0
    if(cf->conn->bits.conn_to_host) {
192
0
      r = curlx_dyn_addf(&buf, ":CHOST-%s", cf->conn->conn_to_host.name);
193
0
      if(r)
194
0
        goto out;
195
0
    }
196
0
    if(cf->conn->bits.conn_to_port) {
197
0
      r = curlx_dyn_addf(&buf, ":CPORT-%d", cf->conn->conn_to_port);
198
0
      if(r)
199
0
        goto out;
200
0
    }
201
0
  }
202
203
0
  if(ssl->version || ssl->version_max) {
204
0
    r = curlx_dyn_addf(&buf, ":TLSVER-%d-%d", ssl->version,
205
0
                       (ssl->version_max >> 16));
206
0
    if(r)
207
0
      goto out;
208
0
  }
209
0
  if(ssl->ssl_options) {
210
0
    r = curlx_dyn_addf(&buf, ":TLSOPT-%x", ssl->ssl_options);
211
0
    if(r)
212
0
      goto out;
213
0
  }
214
0
  if(ssl->cipher_list) {
215
0
    r = curlx_dyn_addf(&buf, ":CIPHER-%s", ssl->cipher_list);
216
0
    if(r)
217
0
      goto out;
218
0
  }
219
0
  if(ssl->cipher_list13) {
220
0
    r = curlx_dyn_addf(&buf, ":CIPHER13-%s", ssl->cipher_list13);
221
0
    if(r)
222
0
      goto out;
223
0
  }
224
0
  if(ssl->curves) {
225
0
    r = curlx_dyn_addf(&buf, ":CURVES-%s", ssl->curves);
226
0
    if(r)
227
0
      goto out;
228
0
  }
229
0
  if(ssl->verifypeer) {
230
0
    r = cf_ssl_peer_key_add_path(&buf, "CA", ssl->CAfile, &is_local);
231
0
    if(r)
232
0
      goto out;
233
0
    r = cf_ssl_peer_key_add_path(&buf, "CApath", ssl->CApath, &is_local);
234
0
    if(r)
235
0
      goto out;
236
0
    r = cf_ssl_peer_key_add_path(&buf, "CRL", ssl->CRLfile, &is_local);
237
0
    if(r)
238
0
      goto out;
239
0
    r = cf_ssl_peer_key_add_path(&buf, "Issuer", ssl->issuercert, &is_local);
240
0
    if(r)
241
0
      goto out;
242
0
    if(ssl->cert_blob) {
243
0
      r = cf_ssl_peer_key_add_hash(&buf, "CertBlob", ssl->cert_blob);
244
0
      if(r)
245
0
        goto out;
246
0
    }
247
0
    if(ssl->ca_info_blob) {
248
0
      r = cf_ssl_peer_key_add_hash(&buf, "CAInfoBlob", ssl->ca_info_blob);
249
0
      if(r)
250
0
        goto out;
251
0
    }
252
0
    if(ssl->issuercert_blob) {
253
0
      r = cf_ssl_peer_key_add_hash(&buf, "IssuerBlob", ssl->issuercert_blob);
254
0
      if(r)
255
0
        goto out;
256
0
    }
257
0
  }
258
0
  if(ssl->pinned_key && ssl->pinned_key[0]) {
259
0
    r = curlx_dyn_addf(&buf, ":Pinned-%s", ssl->pinned_key);
260
0
    if(r)
261
0
      goto out;
262
0
  }
263
264
0
  if(ssl->clientcert && ssl->clientcert[0]) {
265
0
    r = curlx_dyn_add(&buf, ":CCERT");
266
0
    if(r)
267
0
      goto out;
268
0
  }
269
0
#ifdef USE_TLS_SRP
270
0
  if(ssl->username || ssl->password) {
271
0
    r = curlx_dyn_add(&buf, ":SRP-AUTH");
272
0
    if(r)
273
0
      goto out;
274
0
  }
275
0
#endif
276
277
0
  if(!tls_id || !tls_id[0]) {
278
0
    r = CURLE_FAILED_INIT;
279
0
    goto out;
280
0
  }
281
0
  r = curlx_dyn_addf(&buf, ":IMPL-%s", tls_id);
282
0
  if(r)
283
0
    goto out;
284
285
0
  r = curlx_dyn_addf(&buf, is_local ?
286
0
                     CURL_SSLS_LOCAL_SUFFIX : CURL_SSLS_GLOBAL_SUFFIX);
287
0
  if(r)
288
0
    goto out;
289
290
0
  *ppeer_key = curlx_dyn_take(&buf, &key_len);
291
  /* we just added printable char, and dynbuf always null-terminates, no need
292
   * to track length */
293
294
0
out:
295
0
  curlx_dyn_free(&buf);
296
0
  return r;
297
0
}
298
299
struct Curl_ssl_scache {
300
  unsigned int magic;
301
  struct Curl_ssl_scache_peer *peers;
302
  size_t peer_count;
303
  int default_lifetime_secs;
304
  long age;
305
};
306
307
static struct Curl_ssl_scache *cf_ssl_scache_get(struct Curl_easy *data)
308
0
{
309
0
  struct Curl_ssl_scache *scache = NULL;
310
  /* If a share is present, its ssl_scache has preference over the multi */
311
0
  if(data->share && data->share->ssl_scache)
312
0
    scache = data->share->ssl_scache;
313
0
  else if(data->multi && data->multi->ssl_scache)
314
0
    scache = data->multi->ssl_scache;
315
0
  if(scache && !GOOD_SCACHE(scache)) {
316
0
    failf(data, "transfer would use an invalid scache at %p, denied",
317
0
          (void *)scache);
318
0
    DEBUGASSERT(0);
319
0
    return NULL;
320
0
  }
321
0
  return scache;
322
0
}
323
324
static void cf_ssl_scache_session_ldestroy(void *udata, void *obj)
325
0
{
326
0
  struct Curl_ssl_session *s = obj;
327
0
  (void)udata;
328
0
  curlx_free(CURL_UNCONST(s->sdata));
329
0
  curlx_free(CURL_UNCONST(s->quic_tp));
330
0
  curlx_free((void *)s->alpn);
331
0
  curlx_free(s);
332
0
}
333
334
CURLcode Curl_ssl_session_create(void *sdata, size_t sdata_len,
335
                                 int ietf_tls_id, const char *alpn,
336
                                 curl_off_t valid_until, size_t earlydata_max,
337
                                 struct Curl_ssl_session **psession)
338
0
{
339
0
  return Curl_ssl_session_create2(sdata, sdata_len, ietf_tls_id, alpn,
340
0
                                  valid_until, earlydata_max,
341
0
                                  NULL, 0, psession);
342
0
}
343
344
CURLcode Curl_ssl_session_create2(void *sdata, size_t sdata_len,
345
                                  int ietf_tls_id, const char *alpn,
346
                                  curl_off_t valid_until, size_t earlydata_max,
347
                                  unsigned char *quic_tp, size_t quic_tp_len,
348
                                  struct Curl_ssl_session **psession)
349
0
{
350
0
  struct Curl_ssl_session *s;
351
352
0
  if(!sdata || !sdata_len) {
353
0
    curlx_free(sdata);
354
0
    return CURLE_BAD_FUNCTION_ARGUMENT;
355
0
  }
356
357
0
  *psession = NULL;
358
0
  s = curlx_calloc(1, sizeof(*s));
359
0
  if(!s) {
360
0
    curlx_free(sdata);
361
0
    curlx_free(quic_tp);
362
0
    return CURLE_OUT_OF_MEMORY;
363
0
  }
364
365
0
  s->ietf_tls_id = ietf_tls_id;
366
0
  s->valid_until = valid_until;
367
0
  s->earlydata_max = earlydata_max;
368
0
  s->sdata = sdata;
369
0
  s->sdata_len = sdata_len;
370
0
  s->quic_tp = quic_tp;
371
0
  s->quic_tp_len = quic_tp_len;
372
0
  if(alpn) {
373
0
    s->alpn = curlx_strdup(alpn);
374
0
    if(!s->alpn) {
375
0
      cf_ssl_scache_session_ldestroy(NULL, s);
376
0
      return CURLE_OUT_OF_MEMORY;
377
0
    }
378
0
  }
379
0
  *psession = s;
380
0
  return CURLE_OK;
381
0
}
382
383
void Curl_ssl_session_destroy(struct Curl_ssl_session *s)
384
0
{
385
0
  if(s) {
386
    /* if in the list, the list destructor takes care of it */
387
0
    if(Curl_node_llist(&s->list))
388
0
      Curl_node_remove(&s->list);
389
0
    else {
390
0
      cf_ssl_scache_session_ldestroy(NULL, s);
391
0
    }
392
0
  }
393
0
}
394
395
static void cf_ssl_scache_clear_peer(struct Curl_ssl_scache_peer *peer)
396
0
{
397
0
  Curl_llist_destroy(&peer->sessions, NULL);
398
0
  if(peer->sobj) {
399
0
    DEBUGASSERT(peer->sobj_free);
400
0
    if(peer->sobj_free)
401
0
      peer->sobj_free(peer->sobj);
402
0
    peer->sobj = NULL;
403
0
  }
404
0
  peer->sobj_free = NULL;
405
0
  Curl_safefree(peer->clientcert);
406
0
#ifdef USE_TLS_SRP
407
0
  Curl_safefree(peer->srp_username);
408
0
  Curl_safefree(peer->srp_password);
409
0
#endif
410
0
  Curl_safefree(peer->ssl_peer_key);
411
0
  peer->age = 0;
412
0
  peer->hmac_set = FALSE;
413
0
}
414
415
static void cf_ssl_scache_peer_set_obj(struct Curl_ssl_scache_peer *peer,
416
                                       void *sobj,
417
                                       Curl_ssl_scache_obj_dtor *sobj_free)
418
0
{
419
0
  DEBUGASSERT(peer);
420
0
  if(peer->sobj_free) {
421
0
    peer->sobj_free(peer->sobj);
422
0
  }
423
0
  peer->sobj = sobj;
424
0
  peer->sobj_free = sobj_free;
425
0
}
426
427
static void cf_ssl_cache_peer_update(struct Curl_ssl_scache_peer *peer)
428
0
{
429
  /* The sessions of this peer are exportable if
430
   * - it has no confidential information
431
   * - its peer key is not yet known, because sessions were
432
   *   imported using only the salt+hmac
433
   * - the peer key is global, e.g. carrying no relative paths */
434
0
  peer->exportable = (!peer->clientcert && !peer->srp_username &&
435
0
                      !peer->srp_password &&
436
0
                      (!peer->ssl_peer_key ||
437
0
                       cf_ssl_peer_key_is_global(peer->ssl_peer_key)));
438
0
}
439
440
static CURLcode
441
cf_ssl_scache_peer_init(struct Curl_ssl_scache_peer *peer,
442
                        const char *ssl_peer_key,
443
                        const char *clientcert,
444
                        const char *srp_username,
445
                        const char *srp_password,
446
                        const unsigned char *salt,
447
                        const unsigned char *hmac)
448
0
{
449
0
  CURLcode result = CURLE_OUT_OF_MEMORY;
450
451
0
  DEBUGASSERT(!peer->ssl_peer_key);
452
0
  if(ssl_peer_key) {
453
0
    peer->ssl_peer_key = curlx_strdup(ssl_peer_key);
454
0
    if(!peer->ssl_peer_key)
455
0
      goto out;
456
0
    peer->hmac_set = FALSE;
457
0
  }
458
0
  else if(salt && hmac) {
459
0
    memcpy(peer->key_salt, salt, sizeof(peer->key_salt));
460
0
    memcpy(peer->key_hmac, hmac, sizeof(peer->key_hmac));
461
0
    peer->hmac_set = TRUE;
462
0
  }
463
0
  else {
464
0
    result = CURLE_BAD_FUNCTION_ARGUMENT;
465
0
    goto out;
466
0
  }
467
0
  if(clientcert) {
468
0
    peer->clientcert = curlx_strdup(clientcert);
469
0
    if(!peer->clientcert)
470
0
      goto out;
471
0
  }
472
0
  if(srp_username) {
473
0
    peer->srp_username = curlx_strdup(srp_username);
474
0
    if(!peer->srp_username)
475
0
      goto out;
476
0
  }
477
0
  if(srp_password) {
478
0
    peer->srp_password = curlx_strdup(srp_password);
479
0
    if(!peer->srp_password)
480
0
      goto out;
481
0
  }
482
483
0
  cf_ssl_cache_peer_update(peer);
484
0
  result = CURLE_OK;
485
0
out:
486
0
  if(result)
487
0
    cf_ssl_scache_clear_peer(peer);
488
0
  return result;
489
0
}
490
491
static void cf_scache_session_remove(struct Curl_ssl_scache_peer *peer,
492
                                     struct Curl_ssl_session *s)
493
0
{
494
0
  (void)peer;
495
0
  DEBUGASSERT(Curl_node_llist(&s->list) == &peer->sessions);
496
0
  Curl_ssl_session_destroy(s);
497
0
}
498
499
static bool cf_scache_session_expired(struct Curl_ssl_session *s,
500
                                      curl_off_t now)
501
0
{
502
0
  return (s->valid_until > 0) && (s->valid_until < now);
503
0
}
504
505
static void cf_scache_peer_remove_expired(struct Curl_ssl_scache_peer *peer,
506
                                          curl_off_t now)
507
0
{
508
0
  struct Curl_llist_node *n = Curl_llist_head(&peer->sessions);
509
0
  while(n) {
510
0
    struct Curl_ssl_session *s = Curl_node_elem(n);
511
0
    n = Curl_node_next(n);
512
0
    if(cf_scache_session_expired(s, now))
513
0
      cf_scache_session_remove(peer, s);
514
0
  }
515
0
}
516
517
static void cf_scache_peer_remove_non13(struct Curl_ssl_scache_peer *peer)
518
0
{
519
0
  struct Curl_llist_node *n = Curl_llist_head(&peer->sessions);
520
0
  while(n) {
521
0
    struct Curl_ssl_session *s = Curl_node_elem(n);
522
0
    n = Curl_node_next(n);
523
0
    if(s->ietf_tls_id != CURL_IETF_PROTO_TLS1_3)
524
0
      cf_scache_session_remove(peer, s);
525
0
  }
526
0
}
527
528
CURLcode Curl_ssl_scache_create(size_t max_peers,
529
                                size_t max_sessions_per_peer,
530
                                struct Curl_ssl_scache **pscache)
531
0
{
532
0
  struct Curl_ssl_scache *scache;
533
0
  struct Curl_ssl_scache_peer *peers;
534
0
  size_t i;
535
536
0
  *pscache = NULL;
537
0
  peers = curlx_calloc(max_peers, sizeof(*peers));
538
0
  if(!peers)
539
0
    return CURLE_OUT_OF_MEMORY;
540
541
0
  scache = curlx_calloc(1, sizeof(*scache));
542
0
  if(!scache) {
543
0
    curlx_free(peers);
544
0
    return CURLE_OUT_OF_MEMORY;
545
0
  }
546
547
0
  scache->magic = CURL_SCACHE_MAGIC;
548
0
  scache->default_lifetime_secs = (24 * 60 * 60); /* 1 day */
549
0
  scache->peer_count = max_peers;
550
0
  scache->peers = peers;
551
0
  scache->age = 1;
552
0
  for(i = 0; i < scache->peer_count; ++i) {
553
0
    scache->peers[i].max_sessions = max_sessions_per_peer;
554
0
    Curl_llist_init(&scache->peers[i].sessions,
555
0
                    cf_ssl_scache_session_ldestroy);
556
0
  }
557
558
0
  *pscache = scache;
559
0
  return CURLE_OK;
560
0
}
561
562
void Curl_ssl_scache_destroy(struct Curl_ssl_scache *scache)
563
0
{
564
0
  if(GOOD_SCACHE(scache)) {
565
0
    size_t i;
566
0
    scache->magic = 0;
567
0
    for(i = 0; i < scache->peer_count; ++i) {
568
0
      cf_ssl_scache_clear_peer(&scache->peers[i]);
569
0
    }
570
0
    curlx_free(scache->peers);
571
0
    curlx_free(scache);
572
0
  }
573
0
}
574
575
bool Curl_ssl_scache_use(struct Curl_cfilter *cf, struct Curl_easy *data)
576
0
{
577
0
  if(cf_ssl_scache_get(data)) {
578
0
    struct ssl_config_data *ssl_config = Curl_ssl_cf_get_config(cf, data);
579
0
    return ssl_config ? ssl_config->primary.cache_session : FALSE;
580
0
  }
581
0
  return FALSE;
582
0
}
583
584
/* Lock shared SSL session data */
585
void Curl_ssl_scache_lock(struct Curl_easy *data)
586
0
{
587
0
  if(CURL_SHARE_ssl_scache(data))
588
0
    Curl_share_lock(data, CURL_LOCK_DATA_SSL_SESSION, CURL_LOCK_ACCESS_SINGLE);
589
0
}
590
591
/* Unlock shared SSL session data */
592
void Curl_ssl_scache_unlock(struct Curl_easy *data)
593
0
{
594
0
  if(CURL_SHARE_ssl_scache(data))
595
0
    Curl_share_unlock(data, CURL_LOCK_DATA_SSL_SESSION);
596
0
}
597
598
static bool cf_ssl_scache_match_auth(struct Curl_ssl_scache_peer *peer,
599
                                     struct ssl_primary_config *conn_config)
600
0
{
601
0
  if(!conn_config) {
602
0
    if(peer->clientcert)
603
0
      return FALSE;
604
0
#ifdef USE_TLS_SRP
605
0
    if(peer->srp_username || peer->srp_password)
606
0
      return FALSE;
607
0
#endif
608
0
    return TRUE;
609
0
  }
610
0
  else if(!Curl_safecmp(peer->clientcert, conn_config->clientcert))
611
0
    return FALSE;
612
0
#ifdef USE_TLS_SRP
613
0
  if(Curl_timestrcmp(peer->srp_username, conn_config->username) ||
614
0
     Curl_timestrcmp(peer->srp_password, conn_config->password))
615
0
    return FALSE;
616
0
#endif
617
0
  return TRUE;
618
0
}
619
620
static CURLcode cf_ssl_find_peer_by_key(struct Curl_easy *data,
621
                                        struct Curl_ssl_scache *scache,
622
                                        const char *ssl_peer_key,
623
                                        struct ssl_primary_config *conn_config,
624
                                        struct Curl_ssl_scache_peer **ppeer)
625
0
{
626
0
  size_t i, peer_key_len = 0;
627
0
  CURLcode result = CURLE_OK;
628
629
0
  *ppeer = NULL;
630
0
  if(!GOOD_SCACHE(scache)) {
631
0
    return CURLE_BAD_FUNCTION_ARGUMENT;
632
0
  }
633
634
0
  CURL_TRC_SSLS(data, "find peer slot for %s among %zu slots",
635
0
                ssl_peer_key, scache->peer_count);
636
637
  /* check for entries with known peer_key */
638
0
  for(i = 0; scache && i < scache->peer_count; i++) {
639
0
    if(scache->peers[i].ssl_peer_key &&
640
0
       curl_strequal(ssl_peer_key, scache->peers[i].ssl_peer_key) &&
641
0
       cf_ssl_scache_match_auth(&scache->peers[i], conn_config)) {
642
      /* yes, we have a cached session for this! */
643
0
      *ppeer = &scache->peers[i];
644
0
      goto out;
645
0
    }
646
0
  }
647
  /* check for entries with HMAC set but no known peer_key */
648
0
  for(i = 0; scache && i < scache->peer_count; i++) {
649
0
    if(!scache->peers[i].ssl_peer_key &&
650
0
       scache->peers[i].hmac_set &&
651
0
       cf_ssl_scache_match_auth(&scache->peers[i], conn_config)) {
652
      /* possible entry with unknown peer_key, check hmac */
653
0
      unsigned char my_hmac[CURL_SHA256_DIGEST_LENGTH];
654
0
      if(!peer_key_len) /* we are lazy */
655
0
        peer_key_len = strlen(ssl_peer_key);
656
0
      result = Curl_hmacit(&Curl_HMAC_SHA256,
657
0
                           scache->peers[i].key_salt,
658
0
                           sizeof(scache->peers[i].key_salt),
659
0
                           (const unsigned char *)ssl_peer_key,
660
0
                           peer_key_len,
661
0
                           my_hmac);
662
0
      if(result)
663
0
        goto out;
664
0
      if(!memcmp(scache->peers[i].key_hmac, my_hmac, sizeof(my_hmac))) {
665
        /* remember peer_key for future lookups */
666
0
        CURL_TRC_SSLS(data, "peer entry %zu key recovered: %s",
667
0
                      i, ssl_peer_key);
668
0
        scache->peers[i].ssl_peer_key = curlx_strdup(ssl_peer_key);
669
0
        if(!scache->peers[i].ssl_peer_key) {
670
0
          result = CURLE_OUT_OF_MEMORY;
671
0
          goto out;
672
0
        }
673
0
        cf_ssl_cache_peer_update(&scache->peers[i]);
674
0
        *ppeer = &scache->peers[i];
675
0
        goto out;
676
0
      }
677
0
    }
678
0
  }
679
0
  CURL_TRC_SSLS(data, "peer not found for %s", ssl_peer_key);
680
0
out:
681
0
  return result;
682
0
}
683
684
static struct Curl_ssl_scache_peer *
685
cf_ssl_get_free_peer(struct Curl_ssl_scache *scache)
686
0
{
687
0
  struct Curl_ssl_scache_peer *peer = NULL;
688
0
  size_t i;
689
690
  /* find empty or oldest peer */
691
0
  for(i = 0; i < scache->peer_count; ++i) {
692
    /* free peer entry? */
693
0
    if(!scache->peers[i].ssl_peer_key && !scache->peers[i].hmac_set) {
694
0
      peer = &scache->peers[i];
695
0
      break;
696
0
    }
697
    /* peer without sessions and obj */
698
0
    if(!scache->peers[i].sobj &&
699
0
       !Curl_llist_count(&scache->peers[i].sessions)) {
700
0
      peer = &scache->peers[i];
701
0
      break;
702
0
    }
703
    /* remember "oldest" peer */
704
0
    if(!peer || (scache->peers[i].age < peer->age)) {
705
0
      peer = &scache->peers[i];
706
0
    }
707
0
  }
708
0
  DEBUGASSERT(peer);
709
0
  if(peer)
710
0
    cf_ssl_scache_clear_peer(peer);
711
0
  return peer;
712
0
}
713
714
static CURLcode cf_ssl_add_peer(struct Curl_easy *data,
715
                                struct Curl_ssl_scache *scache,
716
                                const char *ssl_peer_key,
717
                                struct ssl_primary_config *conn_config,
718
                                struct Curl_ssl_scache_peer **ppeer)
719
0
{
720
0
  struct Curl_ssl_scache_peer *peer = NULL;
721
0
  CURLcode result = CURLE_OK;
722
723
0
  *ppeer = NULL;
724
0
  if(ssl_peer_key) {
725
0
    result = cf_ssl_find_peer_by_key(data, scache, ssl_peer_key, conn_config,
726
0
                                     &peer);
727
0
    if(result || !scache->peer_count)
728
0
      return result;
729
0
  }
730
731
0
  if(peer) {
732
0
    *ppeer = peer;
733
0
    return CURLE_OK;
734
0
  }
735
736
0
  peer = cf_ssl_get_free_peer(scache);
737
0
  if(peer) {
738
0
    const char *ccert = conn_config ? conn_config->clientcert : NULL;
739
0
    const char *username = NULL, *password = NULL;
740
0
#ifdef USE_TLS_SRP
741
0
    username = conn_config ? conn_config->username : NULL;
742
0
    password = conn_config ? conn_config->password : NULL;
743
0
#endif
744
0
    result = cf_ssl_scache_peer_init(peer, ssl_peer_key, ccert,
745
0
                                     username, password, NULL, NULL);
746
0
    if(result)
747
0
      goto out;
748
    /* all ready */
749
0
    *ppeer = peer;
750
0
    result = CURLE_OK;
751
0
  }
752
753
0
out:
754
0
  if(result) {
755
0
    cf_ssl_scache_clear_peer(peer);
756
0
  }
757
0
  return result;
758
0
}
759
760
static void cf_scache_peer_add_session(struct Curl_ssl_scache_peer *peer,
761
                                       struct Curl_ssl_session *s,
762
                                       curl_off_t now)
763
0
{
764
  /* A session not from TLSv1.3 replaces all other. */
765
0
  if(s->ietf_tls_id != CURL_IETF_PROTO_TLS1_3) {
766
0
    Curl_llist_destroy(&peer->sessions, NULL);
767
0
    Curl_llist_append(&peer->sessions, s, &s->list);
768
0
  }
769
0
  else {
770
    /* Expire existing, append, trim from head to obey max_sessions */
771
0
    cf_scache_peer_remove_expired(peer, now);
772
0
    cf_scache_peer_remove_non13(peer);
773
0
    Curl_llist_append(&peer->sessions, s, &s->list);
774
0
    while(Curl_llist_count(&peer->sessions) > peer->max_sessions) {
775
0
      Curl_node_remove(Curl_llist_head(&peer->sessions));
776
0
    }
777
0
  }
778
0
}
779
780
static CURLcode cf_scache_add_session(struct Curl_cfilter *cf,
781
                                      struct Curl_easy *data,
782
                                      struct Curl_ssl_scache *scache,
783
                                      const char *ssl_peer_key,
784
                                      struct Curl_ssl_session *s)
785
0
{
786
0
  struct Curl_ssl_scache_peer *peer = NULL;
787
0
  struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf);
788
0
  CURLcode result = CURLE_OUT_OF_MEMORY;
789
0
  curl_off_t now = (curl_off_t)time(NULL);
790
0
  curl_off_t max_lifetime;
791
792
0
  if(!scache || !scache->peer_count) {
793
0
    Curl_ssl_session_destroy(s);
794
0
    return CURLE_OK;
795
0
  }
796
797
0
  if(s->valid_until <= 0)
798
0
    s->valid_until = now + scache->default_lifetime_secs;
799
800
0
  max_lifetime = (s->ietf_tls_id == CURL_IETF_PROTO_TLS1_3) ?
801
0
                 CURL_SCACHE_MAX_13_LIFETIME_SEC :
802
0
                 CURL_SCACHE_MAX_12_LIFETIME_SEC;
803
0
  if(s->valid_until > (now + max_lifetime))
804
0
    s->valid_until = now + max_lifetime;
805
806
0
  if(cf_scache_session_expired(s, now)) {
807
0
    CURL_TRC_SSLS(data, "add, session already expired");
808
0
    Curl_ssl_session_destroy(s);
809
0
    return CURLE_OK;
810
0
  }
811
812
0
  result = cf_ssl_add_peer(data, scache, ssl_peer_key, conn_config, &peer);
813
0
  if(result || !peer) {
814
0
    CURL_TRC_SSLS(data, "unable to add scache peer: %d", result);
815
0
    Curl_ssl_session_destroy(s);
816
0
    goto out;
817
0
  }
818
819
0
  cf_scache_peer_add_session(peer, s, now);
820
821
0
out:
822
0
  if(result) {
823
0
    failf(data, "[SCACHE] failed to add session for %s, error=%d",
824
0
          ssl_peer_key, result);
825
0
  }
826
0
  else
827
0
    CURL_TRC_SSLS(data, "added session for %s [proto=0x%x, "
828
0
                  "valid_secs=%" FMT_OFF_T ", alpn=%s, earlydata=%zu, "
829
0
                  "quic_tp=%s], peer has %zu sessions now",
830
0
                  ssl_peer_key, s->ietf_tls_id, s->valid_until - now,
831
0
                  s->alpn, s->earlydata_max, s->quic_tp ? "yes" : "no",
832
0
                  peer ? Curl_llist_count(&peer->sessions) : 0);
833
0
  return result;
834
0
}
835
836
CURLcode Curl_ssl_scache_put(struct Curl_cfilter *cf,
837
                             struct Curl_easy *data,
838
                             const char *ssl_peer_key,
839
                             struct Curl_ssl_session *s)
840
0
{
841
0
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
842
0
  struct ssl_config_data *ssl_config = Curl_ssl_cf_get_config(cf, data);
843
0
  CURLcode result;
844
0
  DEBUGASSERT(ssl_config);
845
846
0
  if(!scache || !ssl_config->primary.cache_session) {
847
0
    Curl_ssl_session_destroy(s);
848
0
    return CURLE_OK;
849
0
  }
850
851
0
  Curl_ssl_scache_lock(data);
852
0
  result = cf_scache_add_session(cf, data, scache, ssl_peer_key, s);
853
0
  Curl_ssl_scache_unlock(data);
854
0
  return result;
855
0
}
856
857
void Curl_ssl_scache_return(struct Curl_cfilter *cf,
858
                            struct Curl_easy *data,
859
                            const char *ssl_peer_key,
860
                            struct Curl_ssl_session *s)
861
0
{
862
  /* See RFC 8446 C.4:
863
   * "Clients SHOULD NOT reuse a ticket for multiple connections." */
864
0
  if(s && s->ietf_tls_id < 0x304)
865
0
    (void)Curl_ssl_scache_put(cf, data, ssl_peer_key, s);
866
0
  else
867
0
    Curl_ssl_session_destroy(s);
868
0
}
869
870
CURLcode Curl_ssl_scache_take(struct Curl_cfilter *cf,
871
                              struct Curl_easy *data,
872
                              const char *ssl_peer_key,
873
                              struct Curl_ssl_session **ps)
874
0
{
875
0
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
876
0
  struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf);
877
0
  struct Curl_ssl_scache_peer *peer = NULL;
878
0
  struct Curl_llist_node *n;
879
0
  struct Curl_ssl_session *s = NULL;
880
0
  CURLcode result;
881
882
0
  *ps = NULL;
883
0
  if(!scache)
884
0
    return CURLE_OK;
885
886
0
  Curl_ssl_scache_lock(data);
887
0
  result = cf_ssl_find_peer_by_key(data, scache, ssl_peer_key, conn_config,
888
0
                                   &peer);
889
0
  if(!result && peer) {
890
0
    cf_scache_peer_remove_expired(peer, (curl_off_t)time(NULL));
891
0
    n = Curl_llist_head(&peer->sessions);
892
0
    if(n) {
893
0
      s = Curl_node_take_elem(n);
894
0
      (scache->age)++;            /* increase general age */
895
0
      peer->age = scache->age; /* set this as used in this age */
896
0
    }
897
0
  }
898
0
  if(s) {
899
0
    *ps = s;
900
0
    CURL_TRC_SSLS(data, "took session for %s [proto=0x%x, "
901
0
                  "alpn=%s, earlydata=%zu, quic_tp=%s], %zu sessions remain",
902
0
                  ssl_peer_key, s->ietf_tls_id, s->alpn,
903
0
                  s->earlydata_max, s->quic_tp ? "yes" : "no",
904
0
                  Curl_llist_count(&peer->sessions));
905
0
  }
906
0
  else {
907
0
    CURL_TRC_SSLS(data, "no cached session for %s", ssl_peer_key);
908
0
  }
909
0
  Curl_ssl_scache_unlock(data);
910
0
  return result;
911
0
}
912
913
CURLcode Curl_ssl_scache_add_obj(struct Curl_cfilter *cf,
914
                                 struct Curl_easy *data,
915
                                 const char *ssl_peer_key,
916
                                 void *sobj,
917
                                 Curl_ssl_scache_obj_dtor *sobj_dtor_cb)
918
0
{
919
0
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
920
0
  struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf);
921
0
  struct Curl_ssl_scache_peer *peer = NULL;
922
0
  CURLcode result;
923
924
0
  DEBUGASSERT(sobj);
925
0
  DEBUGASSERT(sobj_dtor_cb);
926
927
0
  if(!scache) {
928
0
    result = CURLE_BAD_FUNCTION_ARGUMENT;
929
0
    goto out;
930
0
  }
931
932
0
  result = cf_ssl_add_peer(data, scache, ssl_peer_key, conn_config, &peer);
933
0
  if(result || !peer) {
934
0
    CURL_TRC_SSLS(data, "unable to add scache peer: %d", result);
935
0
    goto out;
936
0
  }
937
938
0
  cf_ssl_scache_peer_set_obj(peer, sobj, sobj_dtor_cb);
939
0
  sobj = NULL;  /* peer took ownership */
940
941
0
out:
942
0
  if(sobj && sobj_dtor_cb)
943
0
    sobj_dtor_cb(sobj);
944
0
  return result;
945
0
}
946
947
void *Curl_ssl_scache_get_obj(struct Curl_cfilter *cf,
948
                              struct Curl_easy *data,
949
                              const char *ssl_peer_key)
950
0
{
951
0
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
952
0
  struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf);
953
0
  struct Curl_ssl_scache_peer *peer = NULL;
954
0
  CURLcode result;
955
0
  void *sobj;
956
957
0
  if(!scache)
958
0
    return NULL;
959
960
0
  result = cf_ssl_find_peer_by_key(data, scache, ssl_peer_key, conn_config,
961
0
                                   &peer);
962
0
  if(result)
963
0
    return NULL;
964
965
0
  sobj = peer ? peer->sobj : NULL;
966
967
0
  CURL_TRC_SSLS(data, "%s cached session for '%s'",
968
0
                sobj ? "Found" : "No", ssl_peer_key);
969
0
  return sobj;
970
0
}
971
972
void Curl_ssl_scache_remove_all(struct Curl_cfilter *cf,
973
                                struct Curl_easy *data,
974
                                const char *ssl_peer_key)
975
0
{
976
0
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
977
0
  struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf);
978
0
  struct Curl_ssl_scache_peer *peer = NULL;
979
0
  CURLcode result;
980
981
0
  (void)cf;
982
0
  if(!scache)
983
0
    return;
984
985
0
  Curl_ssl_scache_lock(data);
986
0
  result = cf_ssl_find_peer_by_key(data, scache, ssl_peer_key, conn_config,
987
0
                                   &peer);
988
0
  if(!result && peer)
989
0
    cf_ssl_scache_clear_peer(peer);
990
0
  Curl_ssl_scache_unlock(data);
991
0
}
992
993
#ifdef USE_SSLS_EXPORT
994
995
#define CURL_SSL_TICKET_MAX   (16 * 1024)
996
997
static CURLcode cf_ssl_scache_peer_set_hmac(struct Curl_ssl_scache_peer *peer)
998
{
999
  CURLcode result;
1000
1001
  DEBUGASSERT(peer);
1002
  if(!peer->ssl_peer_key)
1003
    return CURLE_BAD_FUNCTION_ARGUMENT;
1004
1005
  result = Curl_rand(NULL, peer->key_salt, sizeof(peer->key_salt));
1006
  if(result)
1007
    return result;
1008
1009
  result = Curl_hmacit(&Curl_HMAC_SHA256,
1010
                       peer->key_salt, sizeof(peer->key_salt),
1011
                       (const unsigned char *)peer->ssl_peer_key,
1012
                       strlen(peer->ssl_peer_key),
1013
                       peer->key_hmac);
1014
  if(!result)
1015
    peer->hmac_set = TRUE;
1016
  return result;
1017
}
1018
1019
static CURLcode
1020
cf_ssl_find_peer_by_hmac(struct Curl_ssl_scache *scache,
1021
                         const unsigned char *salt,
1022
                         const unsigned char *hmac,
1023
                         struct Curl_ssl_scache_peer **ppeer)
1024
{
1025
  size_t i;
1026
  CURLcode result = CURLE_OK;
1027
1028
  *ppeer = NULL;
1029
  if(!GOOD_SCACHE(scache))
1030
    return CURLE_BAD_FUNCTION_ARGUMENT;
1031
1032
  /* look for an entry that matches salt+hmac exactly or has a known
1033
   * ssl_peer_key which salt+hmac's to the same. */
1034
  for(i = 0; scache && i < scache->peer_count; i++) {
1035
    struct Curl_ssl_scache_peer *peer = &scache->peers[i];
1036
    if(!cf_ssl_scache_match_auth(peer, NULL))
1037
      continue;
1038
    if(scache->peers[i].hmac_set &&
1039
       !memcmp(peer->key_salt, salt, sizeof(peer->key_salt)) &&
1040
       !memcmp(peer->key_hmac, hmac, sizeof(peer->key_hmac))) {
1041
      /* found exact match, return */
1042
      *ppeer = peer;
1043
      goto out;
1044
    }
1045
    else if(peer->ssl_peer_key) {
1046
      unsigned char my_hmac[CURL_SHA256_DIGEST_LENGTH];
1047
      /* compute hmac for the passed salt */
1048
      result = Curl_hmacit(&Curl_HMAC_SHA256,
1049
                           salt, sizeof(peer->key_salt),
1050
                           (const unsigned char *)peer->ssl_peer_key,
1051
                           strlen(peer->ssl_peer_key),
1052
                           my_hmac);
1053
      if(result)
1054
        goto out;
1055
      if(!memcmp(my_hmac, hmac, sizeof(my_hmac))) {
1056
        /* cryptohash match, take over salt+hmac if no set and return */
1057
        if(!peer->hmac_set) {
1058
          memcpy(peer->key_salt, salt, sizeof(peer->key_salt));
1059
          memcpy(peer->key_hmac, hmac, sizeof(peer->key_hmac));
1060
          peer->hmac_set = TRUE;
1061
        }
1062
        *ppeer = peer;
1063
        goto out;
1064
      }
1065
    }
1066
  }
1067
out:
1068
  return result;
1069
}
1070
1071
CURLcode Curl_ssl_session_import(struct Curl_easy *data,
1072
                                 const char *ssl_peer_key,
1073
                                 const unsigned char *shmac, size_t shmac_len,
1074
                                 const void *sdata, size_t sdata_len)
1075
{
1076
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
1077
  struct Curl_ssl_scache_peer *peer = NULL;
1078
  struct Curl_ssl_session *s = NULL;
1079
  bool locked = FALSE;
1080
  CURLcode r;
1081
1082
  if(!scache) {
1083
    r = CURLE_BAD_FUNCTION_ARGUMENT;
1084
    goto out;
1085
  }
1086
  if(!ssl_peer_key && (!shmac || !shmac_len)) {
1087
    r = CURLE_BAD_FUNCTION_ARGUMENT;
1088
    goto out;
1089
  }
1090
1091
  r = Curl_ssl_session_unpack(data, sdata, sdata_len, &s);
1092
  if(r)
1093
    goto out;
1094
1095
  Curl_ssl_scache_lock(data);
1096
  locked = TRUE;
1097
1098
  if(ssl_peer_key) {
1099
    r = cf_ssl_add_peer(data, scache, ssl_peer_key, NULL, &peer);
1100
    if(r)
1101
      goto out;
1102
  }
1103
  else if(shmac_len != (sizeof(peer->key_salt) + sizeof(peer->key_hmac))) {
1104
    /* Either salt+hmac was garbled by caller or is from a curl version
1105
     * that does things differently */
1106
    r = CURLE_BAD_FUNCTION_ARGUMENT;
1107
    goto out;
1108
  }
1109
  else {
1110
    const unsigned char *salt = shmac;
1111
    const unsigned char *hmac = shmac + sizeof(peer->key_salt);
1112
1113
    r = cf_ssl_find_peer_by_hmac(scache, salt, hmac, &peer);
1114
    if(r)
1115
      goto out;
1116
    if(!peer) {
1117
      peer = cf_ssl_get_free_peer(scache);
1118
      if(peer) {
1119
        r = cf_ssl_scache_peer_init(peer, ssl_peer_key, NULL,
1120
                                    NULL, NULL, salt, hmac);
1121
        if(r)
1122
          goto out;
1123
      }
1124
    }
1125
  }
1126
1127
  if(peer) {
1128
    cf_scache_peer_add_session(peer, s, time(NULL));
1129
    s = NULL; /* peer is now owner */
1130
    CURL_TRC_SSLS(data, "successfully imported ticket for peer %s, now "
1131
                  "with %zu tickets",
1132
                  peer->ssl_peer_key ? peer->ssl_peer_key : "without key",
1133
                  Curl_llist_count(&peer->sessions));
1134
  }
1135
1136
out:
1137
  if(locked)
1138
    Curl_ssl_scache_unlock(data);
1139
  Curl_ssl_session_destroy(s);
1140
  return r;
1141
}
1142
1143
CURLcode Curl_ssl_session_export(struct Curl_easy *data,
1144
                                 curl_ssls_export_cb *export_fn,
1145
                                 void *userptr)
1146
{
1147
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
1148
  struct Curl_ssl_scache_peer *peer;
1149
  struct dynbuf sbuf, hbuf;
1150
  struct Curl_llist_node *n;
1151
  size_t i;
1152
  curl_off_t now = time(NULL);
1153
  CURLcode r = CURLE_OK;
1154
#ifdef CURLVERBOSE
1155
  size_t npeers = 0, ntickets = 0;
1156
#endif
1157
1158
  if(!export_fn)
1159
    return CURLE_BAD_FUNCTION_ARGUMENT;
1160
  if(!scache)
1161
    return CURLE_OK;
1162
1163
  Curl_ssl_scache_lock(data);
1164
1165
  curlx_dyn_init(&hbuf, (CURL_SHA256_DIGEST_LENGTH * 2) + 1);
1166
  curlx_dyn_init(&sbuf, CURL_SSL_TICKET_MAX);
1167
1168
  for(i = 0; scache && i < scache->peer_count; i++) {
1169
    peer = &scache->peers[i];
1170
    if(!peer->ssl_peer_key && !peer->hmac_set)
1171
      continue;  /* skip free entry */
1172
    if(!peer->exportable)
1173
      continue;
1174
1175
    curlx_dyn_reset(&hbuf);
1176
    cf_scache_peer_remove_expired(peer, now);
1177
    n = Curl_llist_head(&peer->sessions);
1178
    if(n)
1179
      VERBOSE(++npeers);
1180
    while(n) {
1181
      struct Curl_ssl_session *s = Curl_node_elem(n);
1182
      if(!peer->hmac_set) {
1183
        r = cf_ssl_scache_peer_set_hmac(peer);
1184
        if(r)
1185
          goto out;
1186
      }
1187
      if(!curlx_dyn_len(&hbuf)) {
1188
        r = curlx_dyn_addn(&hbuf, peer->key_salt, sizeof(peer->key_salt));
1189
        if(r)
1190
          goto out;
1191
        r = curlx_dyn_addn(&hbuf, peer->key_hmac, sizeof(peer->key_hmac));
1192
        if(r)
1193
          goto out;
1194
      }
1195
      curlx_dyn_reset(&sbuf);
1196
      r = Curl_ssl_session_pack(data, s, &sbuf);
1197
      if(r)
1198
        goto out;
1199
1200
      r = export_fn(data, userptr, peer->ssl_peer_key,
1201
                    curlx_dyn_uptr(&hbuf), curlx_dyn_len(&hbuf),
1202
                    curlx_dyn_uptr(&sbuf), curlx_dyn_len(&sbuf),
1203
                    s->valid_until, s->ietf_tls_id,
1204
                    s->alpn, s->earlydata_max);
1205
      if(r)
1206
        goto out;
1207
      VERBOSE(++ntickets);
1208
      n = Curl_node_next(n);
1209
    }
1210
  }
1211
  r = CURLE_OK;
1212
  CURL_TRC_SSLS(data, "exported %zu session tickets for %zu peers",
1213
                ntickets, npeers);
1214
1215
out:
1216
  Curl_ssl_scache_unlock(data);
1217
  curlx_dyn_free(&hbuf);
1218
  curlx_dyn_free(&sbuf);
1219
  return r;
1220
}
1221
1222
#endif /* USE_SSLS_EXPORT */
1223
1224
#endif /* USE_SSL */