Coverage Report

Created: 2025-07-11 06:33

/src/PROJ/curl/lib/vtls/vtls_scache.c
Line
Count
Source (jump to first uncovered line)
1
/***************************************************************************
2
 *                                  _   _ ____  _
3
 *  Project                     ___| | | |  _ \| |
4
 *                             / __| | | | |_) | |
5
 *                            | (__| |_| |  _ <| |___
6
 *                             \___|\___/|_| \_\_____|
7
 *
8
 * Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
9
 *
10
 * This software is licensed as described in the file COPYING, which
11
 * you should have received as part of this distribution. The terms
12
 * are also available at https://curl.se/docs/copyright.html.
13
 *
14
 * You may opt to use, copy, modify, merge, publish, distribute and/or sell
15
 * copies of the Software, and permit persons to whom the Software is
16
 * furnished to do so, under the terms of the COPYING file.
17
 *
18
 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
19
 * KIND, either express or implied.
20
 *
21
 * SPDX-License-Identifier: curl
22
 *
23
 ***************************************************************************/
24
25
#include "../curl_setup.h"
26
27
#ifdef USE_SSL
28
29
#ifdef HAVE_SYS_TYPES_H
30
#include <sys/types.h>
31
#endif
32
#ifdef HAVE_FCNTL_H
33
#include <fcntl.h>
34
#endif
35
36
#include "../urldata.h"
37
#include "../cfilters.h"
38
39
#include "vtls.h" /* generic SSL protos etc */
40
#include "vtls_int.h"
41
#include "vtls_scache.h"
42
#include "vtls_spack.h"
43
44
#include "../strcase.h"
45
#include "../url.h"
46
#include "../llist.h"
47
#include "../share.h"
48
#include "../curl_trc.h"
49
#include "../curl_sha256.h"
50
#include "../rand.h"
51
#include "../curlx/warnless.h"
52
#include "../curl_printf.h"
53
#include "../strdup.h"
54
55
/* The last #include files should be: */
56
#include "../curl_memory.h"
57
#include "../memdebug.h"
58
59
60
static bool cf_ssl_peer_key_is_global(const char *peer_key);
61
62
/* a peer+tls-config we cache sessions for */
63
struct Curl_ssl_scache_peer {
64
  char *ssl_peer_key;      /* id for peer + relevant TLS configuration */
65
  char *clientcert;
66
  char *srp_username;
67
  char *srp_password;
68
  struct Curl_llist sessions;
69
  void *sobj;              /* object instance or NULL */
70
  Curl_ssl_scache_obj_dtor *sobj_free; /* free `sobj` callback */
71
  unsigned char key_salt[CURL_SHA256_DIGEST_LENGTH]; /* for entry export */
72
  unsigned char key_hmac[CURL_SHA256_DIGEST_LENGTH]; /* for entry export */
73
  size_t max_sessions;
74
  long age;                /* just a number, the higher the more recent */
75
  BIT(hmac_set);           /* if key_salt and key_hmac are present */
76
  BIT(exportable);         /* sessions for this peer can be exported */
77
};
78
79
0
#define CURL_SCACHE_MAGIC 0x000e1551
80
81
0
#define GOOD_SCACHE(x) ((x) && (x)->magic == CURL_SCACHE_MAGIC)
82
83
struct Curl_ssl_scache {
84
  unsigned int magic;
85
  struct Curl_ssl_scache_peer *peers;
86
  size_t peer_count;
87
  int default_lifetime_secs;
88
  long age;
89
};
90
91
static struct Curl_ssl_scache *cf_ssl_scache_get(struct Curl_easy *data)
92
0
{
93
0
  struct Curl_ssl_scache *scache = NULL;
94
  /* If a share is present, its ssl_scache has preference over the multi */
95
0
  if(data->share && data->share->ssl_scache)
96
0
    scache = data->share->ssl_scache;
97
0
  else if(data->multi && data->multi->ssl_scache)
98
0
    scache = data->multi->ssl_scache;
99
0
  if(scache && !GOOD_SCACHE(scache)) {
100
0
    failf(data, "transfer would use an invalid scache at %p, denied",
101
0
          (void *)scache);
102
0
    DEBUGASSERT(0);
103
0
    return NULL;
104
0
  }
105
0
  return scache;
106
0
}
107
108
static void cf_ssl_scache_session_ldestroy(void *udata, void *obj)
109
0
{
110
0
  struct Curl_ssl_session *s = obj;
111
0
  (void)udata;
112
0
  free(CURL_UNCONST(s->sdata));
113
0
  free(CURL_UNCONST(s->quic_tp));
114
0
  free((void *)s->alpn);
115
0
  free(s);
116
0
}
117
118
CURLcode
119
Curl_ssl_session_create(void *sdata, size_t sdata_len,
120
                        int ietf_tls_id, const char *alpn,
121
                        curl_off_t valid_until, size_t earlydata_max,
122
                        struct Curl_ssl_session **psession)
123
0
{
124
0
  return Curl_ssl_session_create2(sdata, sdata_len, ietf_tls_id, alpn,
125
0
                                  valid_until, earlydata_max,
126
0
                                  NULL, 0, psession);
127
0
}
128
129
CURLcode
130
Curl_ssl_session_create2(void *sdata, size_t sdata_len,
131
                         int ietf_tls_id, const char *alpn,
132
                         curl_off_t valid_until, size_t earlydata_max,
133
                         unsigned char *quic_tp, size_t quic_tp_len,
134
                         struct Curl_ssl_session **psession)
135
0
{
136
0
  struct Curl_ssl_session *s;
137
138
0
  if(!sdata || !sdata_len) {
139
0
    free(sdata);
140
0
    return CURLE_BAD_FUNCTION_ARGUMENT;
141
0
  }
142
143
0
  *psession = NULL;
144
0
  s = calloc(1, sizeof(*s));
145
0
  if(!s) {
146
0
    free(sdata);
147
0
    free(quic_tp);
148
0
    return CURLE_OUT_OF_MEMORY;
149
0
  }
150
151
0
  s->ietf_tls_id = ietf_tls_id;
152
0
  s->valid_until = valid_until;
153
0
  s->earlydata_max = earlydata_max;
154
0
  s->sdata = sdata;
155
0
  s->sdata_len = sdata_len;
156
0
  s->quic_tp = quic_tp;
157
0
  s->quic_tp_len = quic_tp_len;
158
0
  if(alpn) {
159
0
    s->alpn = strdup(alpn);
160
0
    if(!s->alpn) {
161
0
      cf_ssl_scache_session_ldestroy(NULL, s);
162
0
      return CURLE_OUT_OF_MEMORY;
163
0
    }
164
0
  }
165
0
  *psession = s;
166
0
  return CURLE_OK;
167
0
}
168
169
void Curl_ssl_session_destroy(struct Curl_ssl_session *s)
170
0
{
171
0
  if(s) {
172
    /* if in the list, the list destructor takes care of it */
173
0
    if(Curl_node_llist(&s->list))
174
0
      Curl_node_remove(&s->list);
175
0
    else {
176
0
      cf_ssl_scache_session_ldestroy(NULL, s);
177
0
    }
178
0
  }
179
0
}
180
181
static void cf_ssl_scache_clear_peer(struct Curl_ssl_scache_peer *peer)
182
0
{
183
0
  Curl_llist_destroy(&peer->sessions, NULL);
184
0
  if(peer->sobj) {
185
0
    DEBUGASSERT(peer->sobj_free);
186
0
    if(peer->sobj_free)
187
0
      peer->sobj_free(peer->sobj);
188
0
    peer->sobj = NULL;
189
0
  }
190
0
  peer->sobj_free = NULL;
191
0
  Curl_safefree(peer->clientcert);
192
0
#ifdef USE_TLS_SRP
193
0
  Curl_safefree(peer->srp_username);
194
0
  Curl_safefree(peer->srp_password);
195
0
#endif
196
0
  Curl_safefree(peer->ssl_peer_key);
197
0
  peer->age = 0;
198
0
  peer->hmac_set = FALSE;
199
0
}
200
201
static void cf_ssl_scache_peer_set_obj(struct Curl_ssl_scache_peer *peer,
202
                                       void *sobj,
203
                                       Curl_ssl_scache_obj_dtor *sobj_free)
204
0
{
205
0
  DEBUGASSERT(peer);
206
0
  if(peer->sobj_free) {
207
0
    peer->sobj_free(peer->sobj);
208
0
  }
209
0
  peer->sobj = sobj;
210
0
  peer->sobj_free = sobj_free;
211
0
}
212
213
static void cf_ssl_cache_peer_update(struct Curl_ssl_scache_peer *peer)
214
0
{
215
  /* The sessions of this peer are exportable if
216
   * - it has no confidential information
217
   * - its peer key is not yet known, because sessions were
218
   *   imported using only the salt+hmac
219
   * - the peer key is global, e.g. carrying no relative paths */
220
0
  peer->exportable = (!peer->clientcert && !peer->srp_username &&
221
0
                      !peer->srp_password &&
222
0
                      (!peer->ssl_peer_key ||
223
0
                       cf_ssl_peer_key_is_global(peer->ssl_peer_key)));
224
0
}
225
226
static CURLcode
227
cf_ssl_scache_peer_init(struct Curl_ssl_scache_peer *peer,
228
                        const char *ssl_peer_key,
229
                        const char *clientcert,
230
                        const char *srp_username,
231
                        const char *srp_password,
232
                        const unsigned char *salt,
233
                        const unsigned char *hmac)
234
0
{
235
0
  CURLcode result = CURLE_OUT_OF_MEMORY;
236
237
0
  DEBUGASSERT(!peer->ssl_peer_key);
238
0
  if(ssl_peer_key) {
239
0
    peer->ssl_peer_key = strdup(ssl_peer_key);
240
0
    if(!peer->ssl_peer_key)
241
0
      goto out;
242
0
    peer->hmac_set = FALSE;
243
0
  }
244
0
  else if(salt && hmac) {
245
0
    memcpy(peer->key_salt, salt, sizeof(peer->key_salt));
246
0
    memcpy(peer->key_hmac, hmac, sizeof(peer->key_hmac));
247
0
    peer->hmac_set = TRUE;
248
0
  }
249
0
  else {
250
0
    result = CURLE_BAD_FUNCTION_ARGUMENT;
251
0
    goto out;
252
0
  }
253
0
  if(clientcert) {
254
0
    peer->clientcert = strdup(clientcert);
255
0
    if(!peer->clientcert)
256
0
      goto out;
257
0
  }
258
0
  if(srp_username) {
259
0
    peer->srp_username = strdup(srp_username);
260
0
    if(!peer->srp_username)
261
0
      goto out;
262
0
  }
263
0
  if(srp_password) {
264
0
    peer->srp_password = strdup(srp_password);
265
0
    if(!peer->srp_password)
266
0
      goto out;
267
0
  }
268
269
0
  cf_ssl_cache_peer_update(peer);
270
0
  result = CURLE_OK;
271
0
out:
272
0
  if(result)
273
0
    cf_ssl_scache_clear_peer(peer);
274
0
  return result;
275
0
}
276
277
static void cf_scache_session_remove(struct Curl_ssl_scache_peer *peer,
278
                                     struct Curl_ssl_session *s)
279
0
{
280
0
  (void)peer;
281
0
  DEBUGASSERT(Curl_node_llist(&s->list) == &peer->sessions);
282
0
  Curl_ssl_session_destroy(s);
283
0
}
284
285
static bool cf_scache_session_expired(struct Curl_ssl_session *s,
286
                                      curl_off_t now)
287
0
{
288
0
  return (s->valid_until > 0) && (s->valid_until < now);
289
0
}
290
291
static void cf_scache_peer_remove_expired(struct Curl_ssl_scache_peer *peer,
292
                                          curl_off_t now)
293
0
{
294
0
  struct Curl_llist_node *n = Curl_llist_head(&peer->sessions);
295
0
  while(n) {
296
0
    struct Curl_ssl_session *s = Curl_node_elem(n);
297
0
    n = Curl_node_next(n);
298
0
    if(cf_scache_session_expired(s, now))
299
0
      cf_scache_session_remove(peer, s);
300
0
  }
301
0
}
302
303
static void cf_scache_peer_remove_non13(struct Curl_ssl_scache_peer *peer)
304
0
{
305
0
  struct Curl_llist_node *n = Curl_llist_head(&peer->sessions);
306
0
  while(n) {
307
0
    struct Curl_ssl_session *s = Curl_node_elem(n);
308
0
    n = Curl_node_next(n);
309
0
    if(s->ietf_tls_id != CURL_IETF_PROTO_TLS1_3)
310
0
      cf_scache_session_remove(peer, s);
311
0
  }
312
0
}
313
314
CURLcode Curl_ssl_scache_create(size_t max_peers,
315
                                size_t max_sessions_per_peer,
316
                                struct Curl_ssl_scache **pscache)
317
0
{
318
0
  struct Curl_ssl_scache *scache;
319
0
  struct Curl_ssl_scache_peer *peers;
320
0
  size_t i;
321
322
0
  *pscache = NULL;
323
0
  peers = calloc(max_peers, sizeof(*peers));
324
0
  if(!peers)
325
0
    return CURLE_OUT_OF_MEMORY;
326
327
0
  scache = calloc(1, sizeof(*scache));
328
0
  if(!scache) {
329
0
    free(peers);
330
0
    return CURLE_OUT_OF_MEMORY;
331
0
  }
332
333
0
  scache->magic = CURL_SCACHE_MAGIC;
334
0
  scache->default_lifetime_secs = (24*60*60); /* 1 day */
335
0
  scache->peer_count = max_peers;
336
0
  scache->peers = peers;
337
0
  scache->age = 1;
338
0
  for(i = 0; i < scache->peer_count; ++i) {
339
0
    scache->peers[i].max_sessions = max_sessions_per_peer;
340
0
    Curl_llist_init(&scache->peers[i].sessions,
341
0
                    cf_ssl_scache_session_ldestroy);
342
0
  }
343
344
0
  *pscache = scache;
345
0
  return CURLE_OK;
346
0
}
347
348
void Curl_ssl_scache_destroy(struct Curl_ssl_scache *scache)
349
0
{
350
0
  if(scache && GOOD_SCACHE(scache)) {
351
0
    size_t i;
352
0
    scache->magic = 0;
353
0
    for(i = 0; i < scache->peer_count; ++i) {
354
0
      cf_ssl_scache_clear_peer(&scache->peers[i]);
355
0
    }
356
0
    free(scache->peers);
357
0
    free(scache);
358
0
  }
359
0
}
360
361
/* Lock shared SSL session data */
362
void Curl_ssl_scache_lock(struct Curl_easy *data)
363
0
{
364
0
  if(CURL_SHARE_ssl_scache(data))
365
0
    Curl_share_lock(data, CURL_LOCK_DATA_SSL_SESSION, CURL_LOCK_ACCESS_SINGLE);
366
0
}
367
368
/* Unlock shared SSL session data */
369
void Curl_ssl_scache_unlock(struct Curl_easy *data)
370
0
{
371
0
  if(CURL_SHARE_ssl_scache(data))
372
0
    Curl_share_unlock(data, CURL_LOCK_DATA_SSL_SESSION);
373
0
}
374
375
static CURLcode cf_ssl_peer_key_add_path(struct dynbuf *buf,
376
                                          const char *name,
377
                                          char *path,
378
                                          bool *is_local)
379
0
{
380
0
  if(path && path[0]) {
381
    /* We try to add absolute paths, so that the session key can stay
382
     * valid when used in another process with different CWD. However,
383
     * when a path does not exist, this does not work. Then, we add
384
     * the path as is. */
385
#ifdef UNDER_CE
386
    (void)is_local;
387
    return curlx_dyn_addf(buf, ":%s-%s", name, path);
388
#elif defined(_WIN32)
389
    char abspath[_MAX_PATH];
390
    if(_fullpath(abspath, path, _MAX_PATH))
391
      return curlx_dyn_addf(buf, ":%s-%s", name, abspath);
392
    *is_local = TRUE;
393
#elif defined(HAVE_REALPATH)
394
0
    if(path[0] != '/') {
395
0
      char *abspath = realpath(path, NULL);
396
0
      if(abspath) {
397
0
        CURLcode r = curlx_dyn_addf(buf, ":%s-%s", name, abspath);
398
0
        (free)(abspath); /* allocated by libc, free without memdebug */
399
0
        return r;
400
0
      }
401
0
      *is_local = TRUE;
402
0
    }
403
0
#endif
404
0
    return curlx_dyn_addf(buf, ":%s-%s", name, path);
405
0
  }
406
0
  return CURLE_OK;
407
0
}
408
409
static CURLcode cf_ssl_peer_key_add_hash(struct dynbuf *buf,
410
                                          const char *name,
411
                                          struct curl_blob *blob)
412
0
{
413
0
  CURLcode r = CURLE_OK;
414
0
  if(blob && blob->len) {
415
0
    unsigned char hash[CURL_SHA256_DIGEST_LENGTH];
416
0
    size_t i;
417
418
0
    r = curlx_dyn_addf(buf, ":%s-", name);
419
0
    if(r)
420
0
      goto out;
421
0
    r = Curl_sha256it(hash, blob->data, blob->len);
422
0
    if(r)
423
0
      goto out;
424
0
    for(i = 0; i < CURL_SHA256_DIGEST_LENGTH; ++i) {
425
0
      r = curlx_dyn_addf(buf, "%02x", hash[i]);
426
0
      if(r)
427
0
        goto out;
428
0
    }
429
0
  }
430
0
out:
431
0
  return r;
432
0
}
433
434
0
#define CURL_SSLS_LOCAL_SUFFIX     ":L"
435
0
#define CURL_SSLS_GLOBAL_SUFFIX    ":G"
436
437
static bool cf_ssl_peer_key_is_global(const char *peer_key)
438
0
{
439
0
  size_t len = peer_key ? strlen(peer_key) : 0;
440
0
  return (len > 2) &&
441
0
         (peer_key[len - 1] == 'G') &&
442
0
         (peer_key[len - 2] == ':');
443
0
}
444
445
CURLcode Curl_ssl_peer_key_make(struct Curl_cfilter *cf,
446
                                const struct ssl_peer *peer,
447
                                const char *tls_id,
448
                                char **ppeer_key)
449
0
{
450
0
  struct ssl_primary_config *ssl = Curl_ssl_cf_get_primary_config(cf);
451
0
  struct dynbuf buf;
452
0
  size_t key_len;
453
0
  bool is_local = FALSE;
454
0
  CURLcode r;
455
456
0
  *ppeer_key = NULL;
457
0
  curlx_dyn_init(&buf, 10 * 1024);
458
459
0
  r = curlx_dyn_addf(&buf, "%s:%d", peer->hostname, peer->port);
460
0
  if(r)
461
0
    goto out;
462
463
0
  switch(peer->transport) {
464
0
  case TRNSPRT_TCP:
465
0
    break;
466
0
  case TRNSPRT_UDP:
467
0
    r = curlx_dyn_add(&buf, ":UDP");
468
0
    break;
469
0
  case TRNSPRT_QUIC:
470
0
    r = curlx_dyn_add(&buf, ":QUIC");
471
0
    break;
472
0
  case TRNSPRT_UNIX:
473
0
    r = curlx_dyn_add(&buf, ":UNIX");
474
0
    break;
475
0
  default:
476
0
    r = curlx_dyn_addf(&buf, ":TRNSPRT-%d", peer->transport);
477
0
    break;
478
0
  }
479
0
  if(r)
480
0
    goto out;
481
482
0
  if(!ssl->verifypeer) {
483
0
    r = curlx_dyn_add(&buf, ":NO-VRFY-PEER");
484
0
    if(r)
485
0
      goto out;
486
0
  }
487
0
  if(!ssl->verifyhost) {
488
0
    r = curlx_dyn_add(&buf, ":NO-VRFY-HOST");
489
0
    if(r)
490
0
      goto out;
491
0
  }
492
0
  if(ssl->verifystatus) {
493
0
    r = curlx_dyn_add(&buf, ":VRFY-STATUS");
494
0
    if(r)
495
0
      goto out;
496
0
  }
497
0
  if(!ssl->verifypeer || !ssl->verifyhost) {
498
0
    if(cf->conn->bits.conn_to_host) {
499
0
      r = curlx_dyn_addf(&buf, ":CHOST-%s", cf->conn->conn_to_host.name);
500
0
      if(r)
501
0
        goto out;
502
0
    }
503
0
    if(cf->conn->bits.conn_to_port) {
504
0
      r = curlx_dyn_addf(&buf, ":CPORT-%d", cf->conn->conn_to_port);
505
0
      if(r)
506
0
        goto out;
507
0
    }
508
0
  }
509
510
0
  if(ssl->version || ssl->version_max) {
511
0
    r = curlx_dyn_addf(&buf, ":TLSVER-%d-%d", ssl->version,
512
0
                      (ssl->version_max >> 16));
513
0
    if(r)
514
0
      goto out;
515
0
  }
516
0
  if(ssl->ssl_options) {
517
0
    r = curlx_dyn_addf(&buf, ":TLSOPT-%x", ssl->ssl_options);
518
0
    if(r)
519
0
      goto out;
520
0
  }
521
0
  if(ssl->cipher_list) {
522
0
    r = curlx_dyn_addf(&buf, ":CIPHER-%s", ssl->cipher_list);
523
0
    if(r)
524
0
      goto out;
525
0
  }
526
0
  if(ssl->cipher_list13) {
527
0
    r = curlx_dyn_addf(&buf, ":CIPHER13-%s", ssl->cipher_list13);
528
0
    if(r)
529
0
      goto out;
530
0
  }
531
0
  if(ssl->curves) {
532
0
    r = curlx_dyn_addf(&buf, ":CURVES-%s", ssl->curves);
533
0
    if(r)
534
0
      goto out;
535
0
  }
536
0
  if(ssl->verifypeer) {
537
0
    r = cf_ssl_peer_key_add_path(&buf, "CA", ssl->CAfile, &is_local);
538
0
    if(r)
539
0
      goto out;
540
0
    r = cf_ssl_peer_key_add_path(&buf, "CApath", ssl->CApath, &is_local);
541
0
    if(r)
542
0
      goto out;
543
0
    r = cf_ssl_peer_key_add_path(&buf, "CRL", ssl->CRLfile, &is_local);
544
0
    if(r)
545
0
      goto out;
546
0
    r = cf_ssl_peer_key_add_path(&buf, "Issuer", ssl->issuercert, &is_local);
547
0
    if(r)
548
0
      goto out;
549
0
    if(ssl->cert_blob) {
550
0
      r = cf_ssl_peer_key_add_hash(&buf, "CertBlob", ssl->cert_blob);
551
0
      if(r)
552
0
        goto out;
553
0
    }
554
0
    if(ssl->ca_info_blob) {
555
0
      r = cf_ssl_peer_key_add_hash(&buf, "CAInfoBlob", ssl->ca_info_blob);
556
0
      if(r)
557
0
        goto out;
558
0
    }
559
0
    if(ssl->issuercert_blob) {
560
0
      r = cf_ssl_peer_key_add_hash(&buf, "IssuerBlob", ssl->issuercert_blob);
561
0
      if(r)
562
0
        goto out;
563
0
    }
564
0
  }
565
0
  if(ssl->pinned_key && ssl->pinned_key[0]) {
566
0
    r = curlx_dyn_addf(&buf, ":Pinned-%s", ssl->pinned_key);
567
0
    if(r)
568
0
      goto out;
569
0
  }
570
571
0
  if(ssl->clientcert && ssl->clientcert[0]) {
572
0
    r = curlx_dyn_add(&buf, ":CCERT");
573
0
    if(r)
574
0
      goto out;
575
0
  }
576
0
#ifdef USE_TLS_SRP
577
0
  if(ssl->username || ssl->password) {
578
0
    r = curlx_dyn_add(&buf, ":SRP-AUTH");
579
0
    if(r)
580
0
      goto out;
581
0
  }
582
0
#endif
583
584
0
  if(!tls_id || !tls_id[0]) {
585
0
    r = CURLE_FAILED_INIT;
586
0
    goto out;
587
0
  }
588
0
  r = curlx_dyn_addf(&buf, ":IMPL-%s", tls_id);
589
0
  if(r)
590
0
    goto out;
591
592
0
  r = curlx_dyn_addf(&buf, is_local ?
593
0
                     CURL_SSLS_LOCAL_SUFFIX : CURL_SSLS_GLOBAL_SUFFIX);
594
0
  if(r)
595
0
    goto out;
596
597
0
  *ppeer_key = curlx_dyn_take(&buf, &key_len);
598
  /* we just added printable char, and dynbuf always null-terminates, no need
599
   * to track length */
600
601
0
out:
602
0
  curlx_dyn_free(&buf);
603
0
  return r;
604
0
}
605
606
static bool cf_ssl_scache_match_auth(struct Curl_ssl_scache_peer *peer,
607
                                     struct ssl_primary_config *conn_config)
608
0
{
609
0
  if(!conn_config) {
610
0
    if(peer->clientcert)
611
0
      return FALSE;
612
0
#ifdef USE_TLS_SRP
613
0
    if(peer->srp_username || peer->srp_password)
614
0
      return FALSE;
615
0
#endif
616
0
    return TRUE;
617
0
  }
618
0
  else if(!Curl_safecmp(peer->clientcert, conn_config->clientcert))
619
0
    return FALSE;
620
0
#ifdef USE_TLS_SRP
621
0
   if(Curl_timestrcmp(peer->srp_username, conn_config->username) ||
622
0
      Curl_timestrcmp(peer->srp_password, conn_config->password))
623
0
     return FALSE;
624
0
#endif
625
0
  return TRUE;
626
0
}
627
628
static CURLcode
629
cf_ssl_find_peer_by_key(struct Curl_easy *data,
630
                        struct Curl_ssl_scache *scache,
631
                        const char *ssl_peer_key,
632
                        struct ssl_primary_config *conn_config,
633
                        struct Curl_ssl_scache_peer **ppeer)
634
0
{
635
0
  size_t i, peer_key_len = 0;
636
0
  CURLcode result = CURLE_OK;
637
638
0
  *ppeer = NULL;
639
0
  if(!GOOD_SCACHE(scache)) {
640
0
    return CURLE_BAD_FUNCTION_ARGUMENT;
641
0
  }
642
643
0
  CURL_TRC_SSLS(data, "find peer slot for %s among %zu slots",
644
0
                ssl_peer_key, scache->peer_count);
645
646
  /* check for entries with known peer_key */
647
0
  for(i = 0; scache && i < scache->peer_count; i++) {
648
0
    if(scache->peers[i].ssl_peer_key &&
649
0
       curl_strequal(ssl_peer_key, scache->peers[i].ssl_peer_key) &&
650
0
       cf_ssl_scache_match_auth(&scache->peers[i], conn_config)) {
651
      /* yes, we have a cached session for this! */
652
0
      *ppeer = &scache->peers[i];
653
0
      goto out;
654
0
    }
655
0
  }
656
  /* check for entries with HMAC set but no known peer_key */
657
0
  for(i = 0; scache && i < scache->peer_count; i++) {
658
0
    if(!scache->peers[i].ssl_peer_key &&
659
0
       scache->peers[i].hmac_set &&
660
0
       cf_ssl_scache_match_auth(&scache->peers[i], conn_config)) {
661
      /* possible entry with unknown peer_key, check hmac */
662
0
      unsigned char my_hmac[CURL_SHA256_DIGEST_LENGTH];
663
0
      if(!peer_key_len) /* we are lazy */
664
0
        peer_key_len = strlen(ssl_peer_key);
665
0
      result = Curl_hmacit(&Curl_HMAC_SHA256,
666
0
                           scache->peers[i].key_salt,
667
0
                           sizeof(scache->peers[i].key_salt),
668
0
                           (const unsigned char *)ssl_peer_key,
669
0
                           peer_key_len,
670
0
                           my_hmac);
671
0
      if(result)
672
0
        goto out;
673
0
      if(!memcmp(scache->peers[i].key_hmac, my_hmac, sizeof(my_hmac))) {
674
        /* remember peer_key for future lookups */
675
0
        CURL_TRC_SSLS(data, "peer entry %zu key recovered: %s",
676
0
                      i, ssl_peer_key);
677
0
        scache->peers[i].ssl_peer_key = strdup(ssl_peer_key);
678
0
        if(!scache->peers[i].ssl_peer_key) {
679
0
          result = CURLE_OUT_OF_MEMORY;
680
0
          goto out;
681
0
        }
682
0
        cf_ssl_cache_peer_update(&scache->peers[i]);
683
0
        *ppeer = &scache->peers[i];
684
0
        goto out;
685
0
      }
686
0
    }
687
0
  }
688
0
  CURL_TRC_SSLS(data, "peer not found for %s", ssl_peer_key);
689
0
out:
690
0
  return result;
691
0
}
692
693
static struct Curl_ssl_scache_peer *
694
cf_ssl_get_free_peer(struct Curl_ssl_scache *scache)
695
0
{
696
0
  struct Curl_ssl_scache_peer *peer = NULL;
697
0
  size_t i;
698
699
  /* find empty or oldest peer */
700
0
  for(i = 0; i < scache->peer_count; ++i) {
701
    /* free peer entry? */
702
0
    if(!scache->peers[i].ssl_peer_key && !scache->peers[i].hmac_set) {
703
0
      peer = &scache->peers[i];
704
0
      break;
705
0
    }
706
    /* peer without sessions and obj */
707
0
    if(!scache->peers[i].sobj &&
708
0
       !Curl_llist_count(&scache->peers[i].sessions)) {
709
0
      peer = &scache->peers[i];
710
0
      break;
711
0
    }
712
    /* remember "oldest" peer */
713
0
    if(!peer || (scache->peers[i].age < peer->age)) {
714
0
      peer = &scache->peers[i];
715
0
    }
716
0
  }
717
0
  DEBUGASSERT(peer);
718
0
  if(peer)
719
0
    cf_ssl_scache_clear_peer(peer);
720
0
  return peer;
721
0
}
722
723
static CURLcode
724
cf_ssl_add_peer(struct Curl_easy *data,
725
                struct Curl_ssl_scache *scache,
726
                const char *ssl_peer_key,
727
                struct ssl_primary_config *conn_config,
728
                struct Curl_ssl_scache_peer **ppeer)
729
0
{
730
0
  struct Curl_ssl_scache_peer *peer = NULL;
731
0
  CURLcode result = CURLE_OK;
732
733
0
  *ppeer = NULL;
734
0
  if(ssl_peer_key) {
735
0
    result = cf_ssl_find_peer_by_key(data, scache, ssl_peer_key, conn_config,
736
0
                                     &peer);
737
0
    if(result || !scache->peer_count)
738
0
      return result;
739
0
  }
740
741
0
  if(peer) {
742
0
    *ppeer = peer;
743
0
    return CURLE_OK;
744
0
  }
745
746
0
  peer = cf_ssl_get_free_peer(scache);
747
0
  if(peer) {
748
0
    const char *ccert = conn_config ? conn_config->clientcert : NULL;
749
0
    const char *username = NULL, *password = NULL;
750
0
#ifdef USE_TLS_SRP
751
0
    username = conn_config ? conn_config->username : NULL;
752
0
    password = conn_config ? conn_config->password : NULL;
753
0
#endif
754
0
    result = cf_ssl_scache_peer_init(peer, ssl_peer_key, ccert,
755
0
                                     username, password, NULL, NULL);
756
0
    if(result)
757
0
      goto out;
758
    /* all ready */
759
0
    *ppeer = peer;
760
0
    result = CURLE_OK;
761
0
  }
762
763
0
out:
764
0
  if(result) {
765
0
    cf_ssl_scache_clear_peer(peer);
766
0
  }
767
0
  return result;
768
0
}
769
770
static void cf_scache_peer_add_session(struct Curl_ssl_scache_peer *peer,
771
                                       struct Curl_ssl_session *s,
772
                                       curl_off_t now)
773
0
{
774
  /* A session not from TLSv1.3 replaces all other. */
775
0
  if(s->ietf_tls_id != CURL_IETF_PROTO_TLS1_3) {
776
0
    Curl_llist_destroy(&peer->sessions, NULL);
777
0
    Curl_llist_append(&peer->sessions, s, &s->list);
778
0
  }
779
0
  else {
780
    /* Expire existing, append, trim from head to obey max_sessions */
781
0
    cf_scache_peer_remove_expired(peer, now);
782
0
    cf_scache_peer_remove_non13(peer);
783
0
    Curl_llist_append(&peer->sessions, s, &s->list);
784
0
    while(Curl_llist_count(&peer->sessions) > peer->max_sessions) {
785
0
      Curl_node_remove(Curl_llist_head(&peer->sessions));
786
0
    }
787
0
  }
788
0
}
789
790
static CURLcode cf_scache_add_session(struct Curl_cfilter *cf,
791
                                      struct Curl_easy *data,
792
                                      struct Curl_ssl_scache *scache,
793
                                      const char *ssl_peer_key,
794
                                      struct Curl_ssl_session *s)
795
0
{
796
0
  struct Curl_ssl_scache_peer *peer = NULL;
797
0
  struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf);
798
0
  CURLcode result = CURLE_OUT_OF_MEMORY;
799
0
  curl_off_t now = (curl_off_t)time(NULL);
800
0
  curl_off_t max_lifetime;
801
802
0
  if(!scache || !scache->peer_count) {
803
0
    Curl_ssl_session_destroy(s);
804
0
    return CURLE_OK;
805
0
  }
806
807
0
  if(s->valid_until <= 0)
808
0
    s->valid_until = now + scache->default_lifetime_secs;
809
810
0
  max_lifetime = (s->ietf_tls_id == CURL_IETF_PROTO_TLS1_3) ?
811
0
                 CURL_SCACHE_MAX_13_LIFETIME_SEC :
812
0
                 CURL_SCACHE_MAX_12_LIFETIME_SEC;
813
0
  if(s->valid_until > (now + max_lifetime))
814
0
    s->valid_until = now + max_lifetime;
815
816
0
  if(cf_scache_session_expired(s, now)) {
817
0
    CURL_TRC_SSLS(data, "add, session already expired");
818
0
    Curl_ssl_session_destroy(s);
819
0
    return CURLE_OK;
820
0
  }
821
822
0
  result = cf_ssl_add_peer(data, scache, ssl_peer_key, conn_config, &peer);
823
0
  if(result || !peer) {
824
0
    CURL_TRC_SSLS(data, "unable to add scache peer: %d", result);
825
0
    Curl_ssl_session_destroy(s);
826
0
    goto out;
827
0
  }
828
829
0
  cf_scache_peer_add_session(peer, s, now);
830
831
0
out:
832
0
  if(result) {
833
0
    failf(data, "[SCACHE] failed to add session for %s, error=%d",
834
0
          ssl_peer_key, result);
835
0
  }
836
0
  else
837
0
    CURL_TRC_SSLS(data, "added session for %s [proto=0x%x, "
838
0
                  "valid_secs=%" FMT_OFF_T ", alpn=%s, earlydata=%zu, "
839
0
                  "quic_tp=%s], peer has %zu sessions now",
840
0
                  ssl_peer_key, s->ietf_tls_id, s->valid_until - now,
841
0
                  s->alpn, s->earlydata_max, s->quic_tp ? "yes" : "no",
842
0
                  peer ? Curl_llist_count(&peer->sessions) : 0);
843
0
  return result;
844
0
}
845
846
CURLcode Curl_ssl_scache_put(struct Curl_cfilter *cf,
847
                             struct Curl_easy *data,
848
                             const char *ssl_peer_key,
849
                             struct Curl_ssl_session *s)
850
0
{
851
0
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
852
0
  struct ssl_config_data *ssl_config = Curl_ssl_cf_get_config(cf, data);
853
0
  CURLcode result;
854
0
  DEBUGASSERT(ssl_config);
855
856
0
  if(!scache || !ssl_config->primary.cache_session) {
857
0
    Curl_ssl_session_destroy(s);
858
0
    return CURLE_OK;
859
0
  }
860
861
0
  Curl_ssl_scache_lock(data);
862
0
  result = cf_scache_add_session(cf, data, scache, ssl_peer_key, s);
863
0
  Curl_ssl_scache_unlock(data);
864
0
  return result;
865
0
}
866
867
void Curl_ssl_scache_return(struct Curl_cfilter *cf,
868
                           struct Curl_easy *data,
869
                           const char *ssl_peer_key,
870
                           struct Curl_ssl_session *s)
871
0
{
872
  /* See RFC 8446 C.4:
873
   * "Clients SHOULD NOT reuse a ticket for multiple connections." */
874
0
  if(s && s->ietf_tls_id < 0x304)
875
0
    (void)Curl_ssl_scache_put(cf, data, ssl_peer_key, s);
876
0
  else
877
0
    Curl_ssl_session_destroy(s);
878
0
}
879
880
CURLcode Curl_ssl_scache_take(struct Curl_cfilter *cf,
881
                              struct Curl_easy *data,
882
                              const char *ssl_peer_key,
883
                              struct Curl_ssl_session **ps)
884
0
{
885
0
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
886
0
  struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf);
887
0
  struct Curl_ssl_scache_peer *peer = NULL;
888
0
  struct Curl_llist_node *n;
889
0
  struct Curl_ssl_session *s = NULL;
890
0
  CURLcode result;
891
892
0
  *ps = NULL;
893
0
  if(!scache)
894
0
    return CURLE_OK;
895
896
0
  Curl_ssl_scache_lock(data);
897
0
  result = cf_ssl_find_peer_by_key(data, scache, ssl_peer_key, conn_config,
898
0
                                   &peer);
899
0
  if(!result && peer) {
900
0
    cf_scache_peer_remove_expired(peer, (curl_off_t)time(NULL));
901
0
    n = Curl_llist_head(&peer->sessions);
902
0
    if(n) {
903
0
      s = Curl_node_take_elem(n);
904
0
      (scache->age)++;            /* increase general age */
905
0
      peer->age = scache->age; /* set this as used in this age */
906
0
    }
907
0
  }
908
0
  Curl_ssl_scache_unlock(data);
909
0
  if(s) {
910
0
    *ps = s;
911
0
    CURL_TRC_SSLS(data, "took session for %s [proto=0x%x, "
912
0
                  "alpn=%s, earlydata=%zu, quic_tp=%s], %zu sessions remain",
913
0
                  ssl_peer_key, s->ietf_tls_id, s->alpn,
914
0
                  s->earlydata_max, s->quic_tp ? "yes" : "no",
915
0
                  Curl_llist_count(&peer->sessions));
916
0
  }
917
0
  else {
918
0
    CURL_TRC_SSLS(data, "no cached session for %s", ssl_peer_key);
919
0
  }
920
0
  return result;
921
0
}
922
923
CURLcode Curl_ssl_scache_add_obj(struct Curl_cfilter *cf,
924
                                 struct Curl_easy *data,
925
                                 const char *ssl_peer_key,
926
                                 void *sobj,
927
                                 Curl_ssl_scache_obj_dtor *sobj_free)
928
0
{
929
0
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
930
0
  struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf);
931
0
  struct Curl_ssl_scache_peer *peer = NULL;
932
0
  CURLcode result;
933
934
0
  DEBUGASSERT(sobj);
935
0
  DEBUGASSERT(sobj_free);
936
937
0
  if(!scache) {
938
0
    result = CURLE_BAD_FUNCTION_ARGUMENT;
939
0
    goto out;
940
0
  }
941
942
0
  result = cf_ssl_add_peer(data, scache, ssl_peer_key, conn_config, &peer);
943
0
  if(result || !peer) {
944
0
    CURL_TRC_SSLS(data, "unable to add scache peer: %d", result);
945
0
    goto out;
946
0
  }
947
948
0
  cf_ssl_scache_peer_set_obj(peer, sobj, sobj_free);
949
0
  sobj = NULL;  /* peer took ownership */
950
951
0
out:
952
0
  if(sobj && sobj_free)
953
0
    sobj_free(sobj);
954
0
  return result;
955
0
}
956
957
void *Curl_ssl_scache_get_obj(struct Curl_cfilter *cf,
958
                              struct Curl_easy *data,
959
                              const char *ssl_peer_key)
960
0
{
961
0
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
962
0
  struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf);
963
0
  struct Curl_ssl_scache_peer *peer = NULL;
964
0
  CURLcode result;
965
0
  void *sobj;
966
967
0
  if(!scache)
968
0
    return NULL;
969
970
0
  result = cf_ssl_find_peer_by_key(data, scache, ssl_peer_key, conn_config,
971
0
                                   &peer);
972
0
  if(result)
973
0
    return NULL;
974
975
0
  sobj = peer ? peer->sobj : NULL;
976
977
0
  CURL_TRC_SSLS(data, "%s cached session for '%s'",
978
0
                sobj ? "Found" : "No", ssl_peer_key);
979
0
  return sobj;
980
0
}
981
982
void Curl_ssl_scache_remove_all(struct Curl_cfilter *cf,
983
                                struct Curl_easy *data,
984
                                const char *ssl_peer_key)
985
0
{
986
0
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
987
0
  struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf);
988
0
  struct Curl_ssl_scache_peer *peer = NULL;
989
0
  CURLcode result;
990
991
0
  (void)cf;
992
0
  if(!scache)
993
0
    return;
994
995
0
  Curl_ssl_scache_lock(data);
996
0
  result = cf_ssl_find_peer_by_key(data, scache, ssl_peer_key, conn_config,
997
0
                                   &peer);
998
0
  if(!result && peer)
999
0
    cf_ssl_scache_clear_peer(peer);
1000
0
  Curl_ssl_scache_unlock(data);
1001
0
}
1002
1003
#ifdef USE_SSLS_EXPORT
1004
1005
#define CURL_SSL_TICKET_MAX   (16*1024)
1006
1007
static CURLcode cf_ssl_scache_peer_set_hmac(struct Curl_ssl_scache_peer *peer)
1008
{
1009
  CURLcode result;
1010
1011
  DEBUGASSERT(peer);
1012
  if(!peer->ssl_peer_key)
1013
    return CURLE_BAD_FUNCTION_ARGUMENT;
1014
1015
  result = Curl_rand(NULL, peer->key_salt, sizeof(peer->key_salt));
1016
  if(result)
1017
    return result;
1018
1019
  result = Curl_hmacit(&Curl_HMAC_SHA256,
1020
                       peer->key_salt, sizeof(peer->key_salt),
1021
                       (const unsigned char *)peer->ssl_peer_key,
1022
                       strlen(peer->ssl_peer_key),
1023
                       peer->key_hmac);
1024
  if(!result)
1025
    peer->hmac_set = TRUE;
1026
  return result;
1027
}
1028
1029
static CURLcode
1030
cf_ssl_find_peer_by_hmac(struct Curl_ssl_scache *scache,
1031
                         const unsigned char *salt,
1032
                         const unsigned char *hmac,
1033
                         struct Curl_ssl_scache_peer **ppeer)
1034
{
1035
  size_t i;
1036
  CURLcode result = CURLE_OK;
1037
1038
  *ppeer = NULL;
1039
  if(!GOOD_SCACHE(scache))
1040
    return CURLE_BAD_FUNCTION_ARGUMENT;
1041
1042
  /* look for an entry that matches salt+hmac exactly or has a known
1043
   * ssl_peer_key which salt+hmac's to the same. */
1044
  for(i = 0; scache && i < scache->peer_count; i++) {
1045
    struct Curl_ssl_scache_peer *peer = &scache->peers[i];
1046
    if(!cf_ssl_scache_match_auth(peer, NULL))
1047
      continue;
1048
    if(scache->peers[i].hmac_set &&
1049
       !memcmp(peer->key_salt, salt, sizeof(peer->key_salt)) &&
1050
       !memcmp(peer->key_hmac, hmac, sizeof(peer->key_hmac))) {
1051
      /* found exact match, return */
1052
      *ppeer = peer;
1053
      goto out;
1054
    }
1055
    else if(peer->ssl_peer_key) {
1056
      unsigned char my_hmac[CURL_SHA256_DIGEST_LENGTH];
1057
      /* compute hmac for the passed salt */
1058
      result = Curl_hmacit(&Curl_HMAC_SHA256,
1059
                           salt, sizeof(peer->key_salt),
1060
                           (const unsigned char *)peer->ssl_peer_key,
1061
                           strlen(peer->ssl_peer_key),
1062
                           my_hmac);
1063
      if(result)
1064
        goto out;
1065
      if(!memcmp(my_hmac, hmac, sizeof(my_hmac))) {
1066
        /* cryptohash match, take over salt+hmac if no set and return */
1067
        if(!peer->hmac_set) {
1068
          memcpy(peer->key_salt, salt, sizeof(peer->key_salt));
1069
          memcpy(peer->key_hmac, hmac, sizeof(peer->key_hmac));
1070
          peer->hmac_set = TRUE;
1071
        }
1072
        *ppeer = peer;
1073
        goto out;
1074
      }
1075
    }
1076
  }
1077
out:
1078
  return result;
1079
}
1080
1081
CURLcode Curl_ssl_session_import(struct Curl_easy *data,
1082
                                 const char *ssl_peer_key,
1083
                                 const unsigned char *shmac, size_t shmac_len,
1084
                                 const void *sdata, size_t sdata_len)
1085
{
1086
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
1087
  struct Curl_ssl_scache_peer *peer = NULL;
1088
  struct Curl_ssl_session *s = NULL;
1089
  bool locked = FALSE;
1090
  CURLcode r;
1091
1092
  if(!scache) {
1093
    r = CURLE_BAD_FUNCTION_ARGUMENT;
1094
    goto out;
1095
  }
1096
  if(!ssl_peer_key && (!shmac || !shmac_len)) {
1097
    r = CURLE_BAD_FUNCTION_ARGUMENT;
1098
    goto out;
1099
  }
1100
1101
  r = Curl_ssl_session_unpack(data, sdata, sdata_len, &s);
1102
  if(r)
1103
    goto out;
1104
1105
  Curl_ssl_scache_lock(data);
1106
  locked = TRUE;
1107
1108
  if(ssl_peer_key) {
1109
    r = cf_ssl_add_peer(data, scache, ssl_peer_key, NULL, &peer);
1110
    if(r)
1111
      goto out;
1112
  }
1113
  else if(shmac_len != (sizeof(peer->key_salt) + sizeof(peer->key_hmac))) {
1114
    /* Either salt+hmac was garbled by caller or is from a curl version
1115
     * that does things differently */
1116
    r = CURLE_BAD_FUNCTION_ARGUMENT;
1117
    goto out;
1118
  }
1119
  else {
1120
    const unsigned char *salt = shmac;
1121
    const unsigned char *hmac = shmac + sizeof(peer->key_salt);
1122
1123
    r = cf_ssl_find_peer_by_hmac(scache, salt, hmac, &peer);
1124
    if(r)
1125
      goto out;
1126
    if(!peer) {
1127
      peer = cf_ssl_get_free_peer(scache);
1128
      if(peer) {
1129
        r = cf_ssl_scache_peer_init(peer, ssl_peer_key, NULL,
1130
                                    NULL, NULL, salt, hmac);
1131
        if(r)
1132
          goto out;
1133
      }
1134
    }
1135
  }
1136
1137
  if(peer) {
1138
    cf_scache_peer_add_session(peer, s, time(NULL));
1139
    s = NULL; /* peer is now owner */
1140
    CURL_TRC_SSLS(data, "successfully imported ticket for peer %s, now "
1141
                  "with %zu tickets",
1142
                  peer->ssl_peer_key ? peer->ssl_peer_key : "without key",
1143
                  Curl_llist_count(&peer->sessions));
1144
  }
1145
1146
out:
1147
  if(locked)
1148
    Curl_ssl_scache_unlock(data);
1149
  Curl_ssl_session_destroy(s);
1150
  return r;
1151
}
1152
1153
CURLcode Curl_ssl_session_export(struct Curl_easy *data,
1154
                                 curl_ssls_export_cb *export_fn,
1155
                                 void *userptr)
1156
{
1157
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
1158
  struct Curl_ssl_scache_peer *peer;
1159
  struct dynbuf sbuf, hbuf;
1160
  struct Curl_llist_node *n;
1161
  size_t i, npeers = 0, ntickets = 0;
1162
  curl_off_t now = time(NULL);
1163
  CURLcode r = CURLE_OK;
1164
1165
  if(!export_fn)
1166
    return CURLE_BAD_FUNCTION_ARGUMENT;
1167
  if(!scache)
1168
    return CURLE_OK;
1169
1170
  Curl_ssl_scache_lock(data);
1171
1172
  curlx_dyn_init(&hbuf, (CURL_SHA256_DIGEST_LENGTH * 2) + 1);
1173
  curlx_dyn_init(&sbuf, CURL_SSL_TICKET_MAX);
1174
1175
  for(i = 0; scache && i < scache->peer_count; i++) {
1176
    peer = &scache->peers[i];
1177
    if(!peer->ssl_peer_key && !peer->hmac_set)
1178
      continue;  /* skip free entry */
1179
    if(!peer->exportable)
1180
      continue;
1181
1182
    curlx_dyn_reset(&hbuf);
1183
    cf_scache_peer_remove_expired(peer, now);
1184
    n = Curl_llist_head(&peer->sessions);
1185
    if(n)
1186
      ++npeers;
1187
    while(n) {
1188
      struct Curl_ssl_session *s = Curl_node_elem(n);
1189
      if(!peer->hmac_set) {
1190
        r = cf_ssl_scache_peer_set_hmac(peer);
1191
        if(r)
1192
          goto out;
1193
      }
1194
      if(!curlx_dyn_len(&hbuf)) {
1195
        r = curlx_dyn_addn(&hbuf, peer->key_salt, sizeof(peer->key_salt));
1196
        if(r)
1197
          goto out;
1198
        r = curlx_dyn_addn(&hbuf, peer->key_hmac, sizeof(peer->key_hmac));
1199
        if(r)
1200
          goto out;
1201
      }
1202
      curlx_dyn_reset(&sbuf);
1203
      r = Curl_ssl_session_pack(data, s, &sbuf);
1204
      if(r)
1205
        goto out;
1206
1207
      r = export_fn(data, userptr, peer->ssl_peer_key,
1208
                    curlx_dyn_uptr(&hbuf), curlx_dyn_len(&hbuf),
1209
                    curlx_dyn_uptr(&sbuf), curlx_dyn_len(&sbuf),
1210
                    s->valid_until, s->ietf_tls_id,
1211
                    s->alpn, s->earlydata_max);
1212
      if(r)
1213
        goto out;
1214
      ++ntickets;
1215
      n = Curl_node_next(n);
1216
    }
1217
1218
  }
1219
  r = CURLE_OK;
1220
  CURL_TRC_SSLS(data, "exported %zu session tickets for %zu peers",
1221
                ntickets, npeers);
1222
1223
out:
1224
  Curl_ssl_scache_unlock(data);
1225
  curlx_dyn_free(&hbuf);
1226
  curlx_dyn_free(&sbuf);
1227
  return r;
1228
}
1229
1230
#endif /* USE_SSLS_EXPORT */
1231
1232
#endif /* USE_SSL */