Coverage Report

Created: 2025-10-30 06:17

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/PROJ/curl/lib/vtls/vtls_scache.c
Line
Count
Source
1
/***************************************************************************
2
 *                                  _   _ ____  _
3
 *  Project                     ___| | | |  _ \| |
4
 *                             / __| | | | |_) | |
5
 *                            | (__| |_| |  _ <| |___
6
 *                             \___|\___/|_| \_\_____|
7
 *
8
 * Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
9
 *
10
 * This software is licensed as described in the file COPYING, which
11
 * you should have received as part of this distribution. The terms
12
 * are also available at https://curl.se/docs/copyright.html.
13
 *
14
 * You may opt to use, copy, modify, merge, publish, distribute and/or sell
15
 * copies of the Software, and permit persons to whom the Software is
16
 * furnished to do so, under the terms of the COPYING file.
17
 *
18
 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
19
 * KIND, either express or implied.
20
 *
21
 * SPDX-License-Identifier: curl
22
 *
23
 ***************************************************************************/
24
25
#include "../curl_setup.h"
26
27
#ifdef USE_SSL
28
29
#ifdef HAVE_SYS_TYPES_H
30
#include <sys/types.h>
31
#endif
32
33
#include "../urldata.h"
34
#include "../cfilters.h"
35
36
#include "vtls.h" /* generic SSL protos etc */
37
#include "vtls_int.h"
38
#include "vtls_scache.h"
39
#include "vtls_spack.h"
40
41
#include "../strcase.h"
42
#include "../url.h"
43
#include "../llist.h"
44
#include "../share.h"
45
#include "../curl_trc.h"
46
#include "../curl_sha256.h"
47
#include "../rand.h"
48
#include "../curlx/warnless.h"
49
50
/* The last #include files should be: */
51
#include "../curl_memory.h"
52
#include "../memdebug.h"
53
54
55
static bool cf_ssl_peer_key_is_global(const char *peer_key);
56
57
/* a peer+tls-config we cache sessions for */
58
struct Curl_ssl_scache_peer {
59
  char *ssl_peer_key;      /* id for peer + relevant TLS configuration */
60
  char *clientcert;
61
  char *srp_username;
62
  char *srp_password;
63
  struct Curl_llist sessions;
64
  void *sobj;              /* object instance or NULL */
65
  Curl_ssl_scache_obj_dtor *sobj_free; /* free `sobj` callback */
66
  unsigned char key_salt[CURL_SHA256_DIGEST_LENGTH]; /* for entry export */
67
  unsigned char key_hmac[CURL_SHA256_DIGEST_LENGTH]; /* for entry export */
68
  size_t max_sessions;
69
  long age;                /* just a number, the higher the more recent */
70
  BIT(hmac_set);           /* if key_salt and key_hmac are present */
71
  BIT(exportable);         /* sessions for this peer can be exported */
72
};
73
74
0
#define CURL_SCACHE_MAGIC 0x000e1551
75
76
0
#define GOOD_SCACHE(x) ((x) && (x)->magic == CURL_SCACHE_MAGIC)
77
78
struct Curl_ssl_scache {
79
  unsigned int magic;
80
  struct Curl_ssl_scache_peer *peers;
81
  size_t peer_count;
82
  int default_lifetime_secs;
83
  long age;
84
};
85
86
static struct Curl_ssl_scache *cf_ssl_scache_get(struct Curl_easy *data)
87
0
{
88
0
  struct Curl_ssl_scache *scache = NULL;
89
  /* If a share is present, its ssl_scache has preference over the multi */
90
0
  if(data->share && data->share->ssl_scache)
91
0
    scache = data->share->ssl_scache;
92
0
  else if(data->multi && data->multi->ssl_scache)
93
0
    scache = data->multi->ssl_scache;
94
0
  if(scache && !GOOD_SCACHE(scache)) {
95
0
    failf(data, "transfer would use an invalid scache at %p, denied",
96
0
          (void *)scache);
97
0
    DEBUGASSERT(0);
98
0
    return NULL;
99
0
  }
100
0
  return scache;
101
0
}
102
103
static void cf_ssl_scache_session_ldestroy(void *udata, void *obj)
104
0
{
105
0
  struct Curl_ssl_session *s = obj;
106
0
  (void)udata;
107
0
  free(CURL_UNCONST(s->sdata));
108
0
  free(CURL_UNCONST(s->quic_tp));
109
0
  free((void *)s->alpn);
110
0
  free(s);
111
0
}
112
113
CURLcode
114
Curl_ssl_session_create(void *sdata, size_t sdata_len,
115
                        int ietf_tls_id, const char *alpn,
116
                        curl_off_t valid_until, size_t earlydata_max,
117
                        struct Curl_ssl_session **psession)
118
0
{
119
0
  return Curl_ssl_session_create2(sdata, sdata_len, ietf_tls_id, alpn,
120
0
                                  valid_until, earlydata_max,
121
0
                                  NULL, 0, psession);
122
0
}
123
124
CURLcode
125
Curl_ssl_session_create2(void *sdata, size_t sdata_len,
126
                         int ietf_tls_id, const char *alpn,
127
                         curl_off_t valid_until, size_t earlydata_max,
128
                         unsigned char *quic_tp, size_t quic_tp_len,
129
                         struct Curl_ssl_session **psession)
130
0
{
131
0
  struct Curl_ssl_session *s;
132
133
0
  if(!sdata || !sdata_len) {
134
0
    free(sdata);
135
0
    return CURLE_BAD_FUNCTION_ARGUMENT;
136
0
  }
137
138
0
  *psession = NULL;
139
0
  s = calloc(1, sizeof(*s));
140
0
  if(!s) {
141
0
    free(sdata);
142
0
    free(quic_tp);
143
0
    return CURLE_OUT_OF_MEMORY;
144
0
  }
145
146
0
  s->ietf_tls_id = ietf_tls_id;
147
0
  s->valid_until = valid_until;
148
0
  s->earlydata_max = earlydata_max;
149
0
  s->sdata = sdata;
150
0
  s->sdata_len = sdata_len;
151
0
  s->quic_tp = quic_tp;
152
0
  s->quic_tp_len = quic_tp_len;
153
0
  if(alpn) {
154
0
    s->alpn = strdup(alpn);
155
0
    if(!s->alpn) {
156
0
      cf_ssl_scache_session_ldestroy(NULL, s);
157
0
      return CURLE_OUT_OF_MEMORY;
158
0
    }
159
0
  }
160
0
  *psession = s;
161
0
  return CURLE_OK;
162
0
}
163
164
void Curl_ssl_session_destroy(struct Curl_ssl_session *s)
165
0
{
166
0
  if(s) {
167
    /* if in the list, the list destructor takes care of it */
168
0
    if(Curl_node_llist(&s->list))
169
0
      Curl_node_remove(&s->list);
170
0
    else {
171
0
      cf_ssl_scache_session_ldestroy(NULL, s);
172
0
    }
173
0
  }
174
0
}
175
176
static void cf_ssl_scache_clear_peer(struct Curl_ssl_scache_peer *peer)
177
0
{
178
0
  Curl_llist_destroy(&peer->sessions, NULL);
179
0
  if(peer->sobj) {
180
0
    DEBUGASSERT(peer->sobj_free);
181
0
    if(peer->sobj_free)
182
0
      peer->sobj_free(peer->sobj);
183
0
    peer->sobj = NULL;
184
0
  }
185
0
  peer->sobj_free = NULL;
186
0
  Curl_safefree(peer->clientcert);
187
0
#ifdef USE_TLS_SRP
188
0
  Curl_safefree(peer->srp_username);
189
0
  Curl_safefree(peer->srp_password);
190
0
#endif
191
0
  Curl_safefree(peer->ssl_peer_key);
192
0
  peer->age = 0;
193
0
  peer->hmac_set = FALSE;
194
0
}
195
196
static void cf_ssl_scache_peer_set_obj(struct Curl_ssl_scache_peer *peer,
197
                                       void *sobj,
198
                                       Curl_ssl_scache_obj_dtor *sobj_free)
199
0
{
200
0
  DEBUGASSERT(peer);
201
0
  if(peer->sobj_free) {
202
0
    peer->sobj_free(peer->sobj);
203
0
  }
204
0
  peer->sobj = sobj;
205
0
  peer->sobj_free = sobj_free;
206
0
}
207
208
static void cf_ssl_cache_peer_update(struct Curl_ssl_scache_peer *peer)
209
0
{
210
  /* The sessions of this peer are exportable if
211
   * - it has no confidential information
212
   * - its peer key is not yet known, because sessions were
213
   *   imported using only the salt+hmac
214
   * - the peer key is global, e.g. carrying no relative paths */
215
0
  peer->exportable = (!peer->clientcert && !peer->srp_username &&
216
0
                      !peer->srp_password &&
217
0
                      (!peer->ssl_peer_key ||
218
0
                       cf_ssl_peer_key_is_global(peer->ssl_peer_key)));
219
0
}
220
221
static CURLcode
222
cf_ssl_scache_peer_init(struct Curl_ssl_scache_peer *peer,
223
                        const char *ssl_peer_key,
224
                        const char *clientcert,
225
                        const char *srp_username,
226
                        const char *srp_password,
227
                        const unsigned char *salt,
228
                        const unsigned char *hmac)
229
0
{
230
0
  CURLcode result = CURLE_OUT_OF_MEMORY;
231
232
0
  DEBUGASSERT(!peer->ssl_peer_key);
233
0
  if(ssl_peer_key) {
234
0
    peer->ssl_peer_key = strdup(ssl_peer_key);
235
0
    if(!peer->ssl_peer_key)
236
0
      goto out;
237
0
    peer->hmac_set = FALSE;
238
0
  }
239
0
  else if(salt && hmac) {
240
0
    memcpy(peer->key_salt, salt, sizeof(peer->key_salt));
241
0
    memcpy(peer->key_hmac, hmac, sizeof(peer->key_hmac));
242
0
    peer->hmac_set = TRUE;
243
0
  }
244
0
  else {
245
0
    result = CURLE_BAD_FUNCTION_ARGUMENT;
246
0
    goto out;
247
0
  }
248
0
  if(clientcert) {
249
0
    peer->clientcert = strdup(clientcert);
250
0
    if(!peer->clientcert)
251
0
      goto out;
252
0
  }
253
0
  if(srp_username) {
254
0
    peer->srp_username = strdup(srp_username);
255
0
    if(!peer->srp_username)
256
0
      goto out;
257
0
  }
258
0
  if(srp_password) {
259
0
    peer->srp_password = strdup(srp_password);
260
0
    if(!peer->srp_password)
261
0
      goto out;
262
0
  }
263
264
0
  cf_ssl_cache_peer_update(peer);
265
0
  result = CURLE_OK;
266
0
out:
267
0
  if(result)
268
0
    cf_ssl_scache_clear_peer(peer);
269
0
  return result;
270
0
}
271
272
static void cf_scache_session_remove(struct Curl_ssl_scache_peer *peer,
273
                                     struct Curl_ssl_session *s)
274
0
{
275
0
  (void)peer;
276
0
  DEBUGASSERT(Curl_node_llist(&s->list) == &peer->sessions);
277
0
  Curl_ssl_session_destroy(s);
278
0
}
279
280
static bool cf_scache_session_expired(struct Curl_ssl_session *s,
281
                                      curl_off_t now)
282
0
{
283
0
  return (s->valid_until > 0) && (s->valid_until < now);
284
0
}
285
286
static void cf_scache_peer_remove_expired(struct Curl_ssl_scache_peer *peer,
287
                                          curl_off_t now)
288
0
{
289
0
  struct Curl_llist_node *n = Curl_llist_head(&peer->sessions);
290
0
  while(n) {
291
0
    struct Curl_ssl_session *s = Curl_node_elem(n);
292
0
    n = Curl_node_next(n);
293
0
    if(cf_scache_session_expired(s, now))
294
0
      cf_scache_session_remove(peer, s);
295
0
  }
296
0
}
297
298
static void cf_scache_peer_remove_non13(struct Curl_ssl_scache_peer *peer)
299
0
{
300
0
  struct Curl_llist_node *n = Curl_llist_head(&peer->sessions);
301
0
  while(n) {
302
0
    struct Curl_ssl_session *s = Curl_node_elem(n);
303
0
    n = Curl_node_next(n);
304
0
    if(s->ietf_tls_id != CURL_IETF_PROTO_TLS1_3)
305
0
      cf_scache_session_remove(peer, s);
306
0
  }
307
0
}
308
309
CURLcode Curl_ssl_scache_create(size_t max_peers,
310
                                size_t max_sessions_per_peer,
311
                                struct Curl_ssl_scache **pscache)
312
0
{
313
0
  struct Curl_ssl_scache *scache;
314
0
  struct Curl_ssl_scache_peer *peers;
315
0
  size_t i;
316
317
0
  *pscache = NULL;
318
0
  peers = calloc(max_peers, sizeof(*peers));
319
0
  if(!peers)
320
0
    return CURLE_OUT_OF_MEMORY;
321
322
0
  scache = calloc(1, sizeof(*scache));
323
0
  if(!scache) {
324
0
    free(peers);
325
0
    return CURLE_OUT_OF_MEMORY;
326
0
  }
327
328
0
  scache->magic = CURL_SCACHE_MAGIC;
329
0
  scache->default_lifetime_secs = (24*60*60); /* 1 day */
330
0
  scache->peer_count = max_peers;
331
0
  scache->peers = peers;
332
0
  scache->age = 1;
333
0
  for(i = 0; i < scache->peer_count; ++i) {
334
0
    scache->peers[i].max_sessions = max_sessions_per_peer;
335
0
    Curl_llist_init(&scache->peers[i].sessions,
336
0
                    cf_ssl_scache_session_ldestroy);
337
0
  }
338
339
0
  *pscache = scache;
340
0
  return CURLE_OK;
341
0
}
342
343
void Curl_ssl_scache_destroy(struct Curl_ssl_scache *scache)
344
0
{
345
0
  if(scache && GOOD_SCACHE(scache)) {
346
0
    size_t i;
347
0
    scache->magic = 0;
348
0
    for(i = 0; i < scache->peer_count; ++i) {
349
0
      cf_ssl_scache_clear_peer(&scache->peers[i]);
350
0
    }
351
0
    free(scache->peers);
352
0
    free(scache);
353
0
  }
354
0
}
355
356
bool Curl_ssl_scache_use(struct Curl_cfilter *cf, struct Curl_easy *data)
357
0
{
358
0
  if(cf_ssl_scache_get(data)) {
359
0
    struct ssl_config_data *ssl_config = Curl_ssl_cf_get_config(cf, data);
360
0
    return ssl_config ? ssl_config->primary.cache_session : FALSE;
361
0
  }
362
0
  return FALSE;
363
0
}
364
365
/* Lock shared SSL session data */
366
void Curl_ssl_scache_lock(struct Curl_easy *data)
367
0
{
368
0
  if(CURL_SHARE_ssl_scache(data))
369
0
    Curl_share_lock(data, CURL_LOCK_DATA_SSL_SESSION, CURL_LOCK_ACCESS_SINGLE);
370
0
}
371
372
/* Unlock shared SSL session data */
373
void Curl_ssl_scache_unlock(struct Curl_easy *data)
374
0
{
375
0
  if(CURL_SHARE_ssl_scache(data))
376
0
    Curl_share_unlock(data, CURL_LOCK_DATA_SSL_SESSION);
377
0
}
378
379
static CURLcode cf_ssl_peer_key_add_path(struct dynbuf *buf,
380
                                         const char *name,
381
                                         const char *path,
382
                                         bool *is_local)
383
0
{
384
0
  if(path && path[0]) {
385
    /* We try to add absolute paths, so that the session key can stay
386
     * valid when used in another process with different CWD. However,
387
     * when a path does not exist, this does not work. Then, we add
388
     * the path as is. */
389
#ifdef UNDER_CE
390
    (void)is_local;
391
    return curlx_dyn_addf(buf, ":%s-%s", name, path);
392
#elif defined(_WIN32)
393
    char abspath[_MAX_PATH];
394
    if(_fullpath(abspath, path, _MAX_PATH))
395
      return curlx_dyn_addf(buf, ":%s-%s", name, abspath);
396
    *is_local = TRUE;
397
#elif defined(HAVE_REALPATH)
398
0
    if(path[0] != '/') {
399
0
      char *abspath = realpath(path, NULL);
400
0
      if(abspath) {
401
0
        CURLcode r = curlx_dyn_addf(buf, ":%s-%s", name, abspath);
402
0
        (free)(abspath); /* allocated by libc, free without memdebug */
403
0
        return r;
404
0
      }
405
0
      *is_local = TRUE;
406
0
    }
407
0
#endif
408
0
    return curlx_dyn_addf(buf, ":%s-%s", name, path);
409
0
  }
410
0
  return CURLE_OK;
411
0
}
412
413
static CURLcode cf_ssl_peer_key_add_hash(struct dynbuf *buf,
414
                                         const char *name,
415
                                         struct curl_blob *blob)
416
0
{
417
0
  CURLcode r = CURLE_OK;
418
0
  if(blob && blob->len) {
419
0
    unsigned char hash[CURL_SHA256_DIGEST_LENGTH];
420
0
    size_t i;
421
422
0
    r = curlx_dyn_addf(buf, ":%s-", name);
423
0
    if(r)
424
0
      goto out;
425
0
    r = Curl_sha256it(hash, blob->data, blob->len);
426
0
    if(r)
427
0
      goto out;
428
0
    for(i = 0; i < CURL_SHA256_DIGEST_LENGTH; ++i) {
429
0
      r = curlx_dyn_addf(buf, "%02x", hash[i]);
430
0
      if(r)
431
0
        goto out;
432
0
    }
433
0
  }
434
0
out:
435
0
  return r;
436
0
}
437
438
0
#define CURL_SSLS_LOCAL_SUFFIX     ":L"
439
0
#define CURL_SSLS_GLOBAL_SUFFIX    ":G"
440
441
static bool cf_ssl_peer_key_is_global(const char *peer_key)
442
0
{
443
0
  size_t len = peer_key ? strlen(peer_key) : 0;
444
0
  return (len > 2) &&
445
0
         (peer_key[len - 1] == 'G') &&
446
0
         (peer_key[len - 2] == ':');
447
0
}
448
449
CURLcode Curl_ssl_peer_key_make(struct Curl_cfilter *cf,
450
                                const struct ssl_peer *peer,
451
                                const char *tls_id,
452
                                char **ppeer_key)
453
0
{
454
0
  struct ssl_primary_config *ssl = Curl_ssl_cf_get_primary_config(cf);
455
0
  struct dynbuf buf;
456
0
  size_t key_len;
457
0
  bool is_local = FALSE;
458
0
  CURLcode r;
459
460
0
  *ppeer_key = NULL;
461
0
  curlx_dyn_init(&buf, 10 * 1024);
462
463
0
  r = curlx_dyn_addf(&buf, "%s:%d", peer->hostname, peer->port);
464
0
  if(r)
465
0
    goto out;
466
467
0
  switch(peer->transport) {
468
0
  case TRNSPRT_TCP:
469
0
    break;
470
0
  case TRNSPRT_UDP:
471
0
    r = curlx_dyn_add(&buf, ":UDP");
472
0
    break;
473
0
  case TRNSPRT_QUIC:
474
0
    r = curlx_dyn_add(&buf, ":QUIC");
475
0
    break;
476
0
  case TRNSPRT_UNIX:
477
0
    r = curlx_dyn_add(&buf, ":UNIX");
478
0
    break;
479
0
  default:
480
0
    r = curlx_dyn_addf(&buf, ":TRNSPRT-%d", peer->transport);
481
0
    break;
482
0
  }
483
0
  if(r)
484
0
    goto out;
485
486
0
  if(!ssl->verifypeer) {
487
0
    r = curlx_dyn_add(&buf, ":NO-VRFY-PEER");
488
0
    if(r)
489
0
      goto out;
490
0
  }
491
0
  if(!ssl->verifyhost) {
492
0
    r = curlx_dyn_add(&buf, ":NO-VRFY-HOST");
493
0
    if(r)
494
0
      goto out;
495
0
  }
496
0
  if(ssl->verifystatus) {
497
0
    r = curlx_dyn_add(&buf, ":VRFY-STATUS");
498
0
    if(r)
499
0
      goto out;
500
0
  }
501
0
  if(!ssl->verifypeer || !ssl->verifyhost) {
502
0
    if(cf->conn->bits.conn_to_host) {
503
0
      r = curlx_dyn_addf(&buf, ":CHOST-%s", cf->conn->conn_to_host.name);
504
0
      if(r)
505
0
        goto out;
506
0
    }
507
0
    if(cf->conn->bits.conn_to_port) {
508
0
      r = curlx_dyn_addf(&buf, ":CPORT-%d", cf->conn->conn_to_port);
509
0
      if(r)
510
0
        goto out;
511
0
    }
512
0
  }
513
514
0
  if(ssl->version || ssl->version_max) {
515
0
    r = curlx_dyn_addf(&buf, ":TLSVER-%d-%d", ssl->version,
516
0
                      (ssl->version_max >> 16));
517
0
    if(r)
518
0
      goto out;
519
0
  }
520
0
  if(ssl->ssl_options) {
521
0
    r = curlx_dyn_addf(&buf, ":TLSOPT-%x", ssl->ssl_options);
522
0
    if(r)
523
0
      goto out;
524
0
  }
525
0
  if(ssl->cipher_list) {
526
0
    r = curlx_dyn_addf(&buf, ":CIPHER-%s", ssl->cipher_list);
527
0
    if(r)
528
0
      goto out;
529
0
  }
530
0
  if(ssl->cipher_list13) {
531
0
    r = curlx_dyn_addf(&buf, ":CIPHER13-%s", ssl->cipher_list13);
532
0
    if(r)
533
0
      goto out;
534
0
  }
535
0
  if(ssl->curves) {
536
0
    r = curlx_dyn_addf(&buf, ":CURVES-%s", ssl->curves);
537
0
    if(r)
538
0
      goto out;
539
0
  }
540
0
  if(ssl->verifypeer) {
541
0
    r = cf_ssl_peer_key_add_path(&buf, "CA", ssl->CAfile, &is_local);
542
0
    if(r)
543
0
      goto out;
544
0
    r = cf_ssl_peer_key_add_path(&buf, "CApath", ssl->CApath, &is_local);
545
0
    if(r)
546
0
      goto out;
547
0
    r = cf_ssl_peer_key_add_path(&buf, "CRL", ssl->CRLfile, &is_local);
548
0
    if(r)
549
0
      goto out;
550
0
    r = cf_ssl_peer_key_add_path(&buf, "Issuer", ssl->issuercert, &is_local);
551
0
    if(r)
552
0
      goto out;
553
0
    if(ssl->cert_blob) {
554
0
      r = cf_ssl_peer_key_add_hash(&buf, "CertBlob", ssl->cert_blob);
555
0
      if(r)
556
0
        goto out;
557
0
    }
558
0
    if(ssl->ca_info_blob) {
559
0
      r = cf_ssl_peer_key_add_hash(&buf, "CAInfoBlob", ssl->ca_info_blob);
560
0
      if(r)
561
0
        goto out;
562
0
    }
563
0
    if(ssl->issuercert_blob) {
564
0
      r = cf_ssl_peer_key_add_hash(&buf, "IssuerBlob", ssl->issuercert_blob);
565
0
      if(r)
566
0
        goto out;
567
0
    }
568
0
  }
569
0
  if(ssl->pinned_key && ssl->pinned_key[0]) {
570
0
    r = curlx_dyn_addf(&buf, ":Pinned-%s", ssl->pinned_key);
571
0
    if(r)
572
0
      goto out;
573
0
  }
574
575
0
  if(ssl->clientcert && ssl->clientcert[0]) {
576
0
    r = curlx_dyn_add(&buf, ":CCERT");
577
0
    if(r)
578
0
      goto out;
579
0
  }
580
0
#ifdef USE_TLS_SRP
581
0
  if(ssl->username || ssl->password) {
582
0
    r = curlx_dyn_add(&buf, ":SRP-AUTH");
583
0
    if(r)
584
0
      goto out;
585
0
  }
586
0
#endif
587
588
0
  if(!tls_id || !tls_id[0]) {
589
0
    r = CURLE_FAILED_INIT;
590
0
    goto out;
591
0
  }
592
0
  r = curlx_dyn_addf(&buf, ":IMPL-%s", tls_id);
593
0
  if(r)
594
0
    goto out;
595
596
0
  r = curlx_dyn_addf(&buf, is_local ?
597
0
                     CURL_SSLS_LOCAL_SUFFIX : CURL_SSLS_GLOBAL_SUFFIX);
598
0
  if(r)
599
0
    goto out;
600
601
0
  *ppeer_key = curlx_dyn_take(&buf, &key_len);
602
  /* we just added printable char, and dynbuf always null-terminates, no need
603
   * to track length */
604
605
0
out:
606
0
  curlx_dyn_free(&buf);
607
0
  return r;
608
0
}
609
610
static bool cf_ssl_scache_match_auth(struct Curl_ssl_scache_peer *peer,
611
                                     struct ssl_primary_config *conn_config)
612
0
{
613
0
  if(!conn_config) {
614
0
    if(peer->clientcert)
615
0
      return FALSE;
616
0
#ifdef USE_TLS_SRP
617
0
    if(peer->srp_username || peer->srp_password)
618
0
      return FALSE;
619
0
#endif
620
0
    return TRUE;
621
0
  }
622
0
  else if(!Curl_safecmp(peer->clientcert, conn_config->clientcert))
623
0
    return FALSE;
624
0
#ifdef USE_TLS_SRP
625
0
   if(Curl_timestrcmp(peer->srp_username, conn_config->username) ||
626
0
      Curl_timestrcmp(peer->srp_password, conn_config->password))
627
0
     return FALSE;
628
0
#endif
629
0
  return TRUE;
630
0
}
631
632
static CURLcode
633
cf_ssl_find_peer_by_key(struct Curl_easy *data,
634
                        struct Curl_ssl_scache *scache,
635
                        const char *ssl_peer_key,
636
                        struct ssl_primary_config *conn_config,
637
                        struct Curl_ssl_scache_peer **ppeer)
638
0
{
639
0
  size_t i, peer_key_len = 0;
640
0
  CURLcode result = CURLE_OK;
641
642
0
  *ppeer = NULL;
643
0
  if(!GOOD_SCACHE(scache)) {
644
0
    return CURLE_BAD_FUNCTION_ARGUMENT;
645
0
  }
646
647
0
  CURL_TRC_SSLS(data, "find peer slot for %s among %zu slots",
648
0
                ssl_peer_key, scache->peer_count);
649
650
  /* check for entries with known peer_key */
651
0
  for(i = 0; scache && i < scache->peer_count; i++) {
652
0
    if(scache->peers[i].ssl_peer_key &&
653
0
       curl_strequal(ssl_peer_key, scache->peers[i].ssl_peer_key) &&
654
0
       cf_ssl_scache_match_auth(&scache->peers[i], conn_config)) {
655
      /* yes, we have a cached session for this! */
656
0
      *ppeer = &scache->peers[i];
657
0
      goto out;
658
0
    }
659
0
  }
660
  /* check for entries with HMAC set but no known peer_key */
661
0
  for(i = 0; scache && i < scache->peer_count; i++) {
662
0
    if(!scache->peers[i].ssl_peer_key &&
663
0
       scache->peers[i].hmac_set &&
664
0
       cf_ssl_scache_match_auth(&scache->peers[i], conn_config)) {
665
      /* possible entry with unknown peer_key, check hmac */
666
0
      unsigned char my_hmac[CURL_SHA256_DIGEST_LENGTH];
667
0
      if(!peer_key_len) /* we are lazy */
668
0
        peer_key_len = strlen(ssl_peer_key);
669
0
      result = Curl_hmacit(&Curl_HMAC_SHA256,
670
0
                           scache->peers[i].key_salt,
671
0
                           sizeof(scache->peers[i].key_salt),
672
0
                           (const unsigned char *)ssl_peer_key,
673
0
                           peer_key_len,
674
0
                           my_hmac);
675
0
      if(result)
676
0
        goto out;
677
0
      if(!memcmp(scache->peers[i].key_hmac, my_hmac, sizeof(my_hmac))) {
678
        /* remember peer_key for future lookups */
679
0
        CURL_TRC_SSLS(data, "peer entry %zu key recovered: %s",
680
0
                      i, ssl_peer_key);
681
0
        scache->peers[i].ssl_peer_key = strdup(ssl_peer_key);
682
0
        if(!scache->peers[i].ssl_peer_key) {
683
0
          result = CURLE_OUT_OF_MEMORY;
684
0
          goto out;
685
0
        }
686
0
        cf_ssl_cache_peer_update(&scache->peers[i]);
687
0
        *ppeer = &scache->peers[i];
688
0
        goto out;
689
0
      }
690
0
    }
691
0
  }
692
0
  CURL_TRC_SSLS(data, "peer not found for %s", ssl_peer_key);
693
0
out:
694
0
  return result;
695
0
}
696
697
static struct Curl_ssl_scache_peer *
698
cf_ssl_get_free_peer(struct Curl_ssl_scache *scache)
699
0
{
700
0
  struct Curl_ssl_scache_peer *peer = NULL;
701
0
  size_t i;
702
703
  /* find empty or oldest peer */
704
0
  for(i = 0; i < scache->peer_count; ++i) {
705
    /* free peer entry? */
706
0
    if(!scache->peers[i].ssl_peer_key && !scache->peers[i].hmac_set) {
707
0
      peer = &scache->peers[i];
708
0
      break;
709
0
    }
710
    /* peer without sessions and obj */
711
0
    if(!scache->peers[i].sobj &&
712
0
       !Curl_llist_count(&scache->peers[i].sessions)) {
713
0
      peer = &scache->peers[i];
714
0
      break;
715
0
    }
716
    /* remember "oldest" peer */
717
0
    if(!peer || (scache->peers[i].age < peer->age)) {
718
0
      peer = &scache->peers[i];
719
0
    }
720
0
  }
721
0
  DEBUGASSERT(peer);
722
0
  if(peer)
723
0
    cf_ssl_scache_clear_peer(peer);
724
0
  return peer;
725
0
}
726
727
static CURLcode
728
cf_ssl_add_peer(struct Curl_easy *data,
729
                struct Curl_ssl_scache *scache,
730
                const char *ssl_peer_key,
731
                struct ssl_primary_config *conn_config,
732
                struct Curl_ssl_scache_peer **ppeer)
733
0
{
734
0
  struct Curl_ssl_scache_peer *peer = NULL;
735
0
  CURLcode result = CURLE_OK;
736
737
0
  *ppeer = NULL;
738
0
  if(ssl_peer_key) {
739
0
    result = cf_ssl_find_peer_by_key(data, scache, ssl_peer_key, conn_config,
740
0
                                     &peer);
741
0
    if(result || !scache->peer_count)
742
0
      return result;
743
0
  }
744
745
0
  if(peer) {
746
0
    *ppeer = peer;
747
0
    return CURLE_OK;
748
0
  }
749
750
0
  peer = cf_ssl_get_free_peer(scache);
751
0
  if(peer) {
752
0
    const char *ccert = conn_config ? conn_config->clientcert : NULL;
753
0
    const char *username = NULL, *password = NULL;
754
0
#ifdef USE_TLS_SRP
755
0
    username = conn_config ? conn_config->username : NULL;
756
0
    password = conn_config ? conn_config->password : NULL;
757
0
#endif
758
0
    result = cf_ssl_scache_peer_init(peer, ssl_peer_key, ccert,
759
0
                                     username, password, NULL, NULL);
760
0
    if(result)
761
0
      goto out;
762
    /* all ready */
763
0
    *ppeer = peer;
764
0
    result = CURLE_OK;
765
0
  }
766
767
0
out:
768
0
  if(result) {
769
0
    cf_ssl_scache_clear_peer(peer);
770
0
  }
771
0
  return result;
772
0
}
773
774
static void cf_scache_peer_add_session(struct Curl_ssl_scache_peer *peer,
775
                                       struct Curl_ssl_session *s,
776
                                       curl_off_t now)
777
0
{
778
  /* A session not from TLSv1.3 replaces all other. */
779
0
  if(s->ietf_tls_id != CURL_IETF_PROTO_TLS1_3) {
780
0
    Curl_llist_destroy(&peer->sessions, NULL);
781
0
    Curl_llist_append(&peer->sessions, s, &s->list);
782
0
  }
783
0
  else {
784
    /* Expire existing, append, trim from head to obey max_sessions */
785
0
    cf_scache_peer_remove_expired(peer, now);
786
0
    cf_scache_peer_remove_non13(peer);
787
0
    Curl_llist_append(&peer->sessions, s, &s->list);
788
0
    while(Curl_llist_count(&peer->sessions) > peer->max_sessions) {
789
0
      Curl_node_remove(Curl_llist_head(&peer->sessions));
790
0
    }
791
0
  }
792
0
}
793
794
static CURLcode cf_scache_add_session(struct Curl_cfilter *cf,
795
                                      struct Curl_easy *data,
796
                                      struct Curl_ssl_scache *scache,
797
                                      const char *ssl_peer_key,
798
                                      struct Curl_ssl_session *s)
799
0
{
800
0
  struct Curl_ssl_scache_peer *peer = NULL;
801
0
  struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf);
802
0
  CURLcode result = CURLE_OUT_OF_MEMORY;
803
0
  curl_off_t now = (curl_off_t)time(NULL);
804
0
  curl_off_t max_lifetime;
805
806
0
  if(!scache || !scache->peer_count) {
807
0
    Curl_ssl_session_destroy(s);
808
0
    return CURLE_OK;
809
0
  }
810
811
0
  if(s->valid_until <= 0)
812
0
    s->valid_until = now + scache->default_lifetime_secs;
813
814
0
  max_lifetime = (s->ietf_tls_id == CURL_IETF_PROTO_TLS1_3) ?
815
0
                 CURL_SCACHE_MAX_13_LIFETIME_SEC :
816
0
                 CURL_SCACHE_MAX_12_LIFETIME_SEC;
817
0
  if(s->valid_until > (now + max_lifetime))
818
0
    s->valid_until = now + max_lifetime;
819
820
0
  if(cf_scache_session_expired(s, now)) {
821
0
    CURL_TRC_SSLS(data, "add, session already expired");
822
0
    Curl_ssl_session_destroy(s);
823
0
    return CURLE_OK;
824
0
  }
825
826
0
  result = cf_ssl_add_peer(data, scache, ssl_peer_key, conn_config, &peer);
827
0
  if(result || !peer) {
828
0
    CURL_TRC_SSLS(data, "unable to add scache peer: %d", result);
829
0
    Curl_ssl_session_destroy(s);
830
0
    goto out;
831
0
  }
832
833
0
  cf_scache_peer_add_session(peer, s, now);
834
835
0
out:
836
0
  if(result) {
837
0
    failf(data, "[SCACHE] failed to add session for %s, error=%d",
838
0
          ssl_peer_key, result);
839
0
  }
840
0
  else
841
0
    CURL_TRC_SSLS(data, "added session for %s [proto=0x%x, "
842
0
                  "valid_secs=%" FMT_OFF_T ", alpn=%s, earlydata=%zu, "
843
0
                  "quic_tp=%s], peer has %zu sessions now",
844
0
                  ssl_peer_key, s->ietf_tls_id, s->valid_until - now,
845
0
                  s->alpn, s->earlydata_max, s->quic_tp ? "yes" : "no",
846
0
                  peer ? Curl_llist_count(&peer->sessions) : 0);
847
0
  return result;
848
0
}
849
850
CURLcode Curl_ssl_scache_put(struct Curl_cfilter *cf,
851
                             struct Curl_easy *data,
852
                             const char *ssl_peer_key,
853
                             struct Curl_ssl_session *s)
854
0
{
855
0
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
856
0
  struct ssl_config_data *ssl_config = Curl_ssl_cf_get_config(cf, data);
857
0
  CURLcode result;
858
0
  DEBUGASSERT(ssl_config);
859
860
0
  if(!scache || !ssl_config->primary.cache_session) {
861
0
    Curl_ssl_session_destroy(s);
862
0
    return CURLE_OK;
863
0
  }
864
865
0
  Curl_ssl_scache_lock(data);
866
0
  result = cf_scache_add_session(cf, data, scache, ssl_peer_key, s);
867
0
  Curl_ssl_scache_unlock(data);
868
0
  return result;
869
0
}
870
871
void Curl_ssl_scache_return(struct Curl_cfilter *cf,
872
                            struct Curl_easy *data,
873
                            const char *ssl_peer_key,
874
                            struct Curl_ssl_session *s)
875
0
{
876
  /* See RFC 8446 C.4:
877
   * "Clients SHOULD NOT reuse a ticket for multiple connections." */
878
0
  if(s && s->ietf_tls_id < 0x304)
879
0
    (void)Curl_ssl_scache_put(cf, data, ssl_peer_key, s);
880
0
  else
881
0
    Curl_ssl_session_destroy(s);
882
0
}
883
884
CURLcode Curl_ssl_scache_take(struct Curl_cfilter *cf,
885
                              struct Curl_easy *data,
886
                              const char *ssl_peer_key,
887
                              struct Curl_ssl_session **ps)
888
0
{
889
0
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
890
0
  struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf);
891
0
  struct Curl_ssl_scache_peer *peer = NULL;
892
0
  struct Curl_llist_node *n;
893
0
  struct Curl_ssl_session *s = NULL;
894
0
  CURLcode result;
895
896
0
  *ps = NULL;
897
0
  if(!scache)
898
0
    return CURLE_OK;
899
900
0
  Curl_ssl_scache_lock(data);
901
0
  result = cf_ssl_find_peer_by_key(data, scache, ssl_peer_key, conn_config,
902
0
                                   &peer);
903
0
  if(!result && peer) {
904
0
    cf_scache_peer_remove_expired(peer, (curl_off_t)time(NULL));
905
0
    n = Curl_llist_head(&peer->sessions);
906
0
    if(n) {
907
0
      s = Curl_node_take_elem(n);
908
0
      (scache->age)++;            /* increase general age */
909
0
      peer->age = scache->age; /* set this as used in this age */
910
0
    }
911
0
  }
912
0
  if(s) {
913
0
    *ps = s;
914
0
    CURL_TRC_SSLS(data, "took session for %s [proto=0x%x, "
915
0
                  "alpn=%s, earlydata=%zu, quic_tp=%s], %zu sessions remain",
916
0
                  ssl_peer_key, s->ietf_tls_id, s->alpn,
917
0
                  s->earlydata_max, s->quic_tp ? "yes" : "no",
918
0
                  Curl_llist_count(&peer->sessions));
919
0
  }
920
0
  else {
921
0
    CURL_TRC_SSLS(data, "no cached session for %s", ssl_peer_key);
922
0
  }
923
0
  Curl_ssl_scache_unlock(data);
924
0
  return result;
925
0
}
926
927
CURLcode Curl_ssl_scache_add_obj(struct Curl_cfilter *cf,
928
                                 struct Curl_easy *data,
929
                                 const char *ssl_peer_key,
930
                                 void *sobj,
931
                                 Curl_ssl_scache_obj_dtor *sobj_free)
932
0
{
933
0
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
934
0
  struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf);
935
0
  struct Curl_ssl_scache_peer *peer = NULL;
936
0
  CURLcode result;
937
938
0
  DEBUGASSERT(sobj);
939
0
  DEBUGASSERT(sobj_free);
940
941
0
  if(!scache) {
942
0
    result = CURLE_BAD_FUNCTION_ARGUMENT;
943
0
    goto out;
944
0
  }
945
946
0
  result = cf_ssl_add_peer(data, scache, ssl_peer_key, conn_config, &peer);
947
0
  if(result || !peer) {
948
0
    CURL_TRC_SSLS(data, "unable to add scache peer: %d", result);
949
0
    goto out;
950
0
  }
951
952
0
  cf_ssl_scache_peer_set_obj(peer, sobj, sobj_free);
953
0
  sobj = NULL;  /* peer took ownership */
954
955
0
out:
956
0
  if(sobj && sobj_free)
957
0
    sobj_free(sobj);
958
0
  return result;
959
0
}
960
961
void *Curl_ssl_scache_get_obj(struct Curl_cfilter *cf,
962
                              struct Curl_easy *data,
963
                              const char *ssl_peer_key)
964
0
{
965
0
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
966
0
  struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf);
967
0
  struct Curl_ssl_scache_peer *peer = NULL;
968
0
  CURLcode result;
969
0
  void *sobj;
970
971
0
  if(!scache)
972
0
    return NULL;
973
974
0
  result = cf_ssl_find_peer_by_key(data, scache, ssl_peer_key, conn_config,
975
0
                                   &peer);
976
0
  if(result)
977
0
    return NULL;
978
979
0
  sobj = peer ? peer->sobj : NULL;
980
981
0
  CURL_TRC_SSLS(data, "%s cached session for '%s'",
982
0
                sobj ? "Found" : "No", ssl_peer_key);
983
0
  return sobj;
984
0
}
985
986
void Curl_ssl_scache_remove_all(struct Curl_cfilter *cf,
987
                                struct Curl_easy *data,
988
                                const char *ssl_peer_key)
989
0
{
990
0
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
991
0
  struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf);
992
0
  struct Curl_ssl_scache_peer *peer = NULL;
993
0
  CURLcode result;
994
995
0
  (void)cf;
996
0
  if(!scache)
997
0
    return;
998
999
0
  Curl_ssl_scache_lock(data);
1000
0
  result = cf_ssl_find_peer_by_key(data, scache, ssl_peer_key, conn_config,
1001
0
                                   &peer);
1002
0
  if(!result && peer)
1003
0
    cf_ssl_scache_clear_peer(peer);
1004
0
  Curl_ssl_scache_unlock(data);
1005
0
}
1006
1007
#ifdef USE_SSLS_EXPORT
1008
1009
#define CURL_SSL_TICKET_MAX   (16*1024)
1010
1011
static CURLcode cf_ssl_scache_peer_set_hmac(struct Curl_ssl_scache_peer *peer)
1012
{
1013
  CURLcode result;
1014
1015
  DEBUGASSERT(peer);
1016
  if(!peer->ssl_peer_key)
1017
    return CURLE_BAD_FUNCTION_ARGUMENT;
1018
1019
  result = Curl_rand(NULL, peer->key_salt, sizeof(peer->key_salt));
1020
  if(result)
1021
    return result;
1022
1023
  result = Curl_hmacit(&Curl_HMAC_SHA256,
1024
                       peer->key_salt, sizeof(peer->key_salt),
1025
                       (const unsigned char *)peer->ssl_peer_key,
1026
                       strlen(peer->ssl_peer_key),
1027
                       peer->key_hmac);
1028
  if(!result)
1029
    peer->hmac_set = TRUE;
1030
  return result;
1031
}
1032
1033
static CURLcode
1034
cf_ssl_find_peer_by_hmac(struct Curl_ssl_scache *scache,
1035
                         const unsigned char *salt,
1036
                         const unsigned char *hmac,
1037
                         struct Curl_ssl_scache_peer **ppeer)
1038
{
1039
  size_t i;
1040
  CURLcode result = CURLE_OK;
1041
1042
  *ppeer = NULL;
1043
  if(!GOOD_SCACHE(scache))
1044
    return CURLE_BAD_FUNCTION_ARGUMENT;
1045
1046
  /* look for an entry that matches salt+hmac exactly or has a known
1047
   * ssl_peer_key which salt+hmac's to the same. */
1048
  for(i = 0; scache && i < scache->peer_count; i++) {
1049
    struct Curl_ssl_scache_peer *peer = &scache->peers[i];
1050
    if(!cf_ssl_scache_match_auth(peer, NULL))
1051
      continue;
1052
    if(scache->peers[i].hmac_set &&
1053
       !memcmp(peer->key_salt, salt, sizeof(peer->key_salt)) &&
1054
       !memcmp(peer->key_hmac, hmac, sizeof(peer->key_hmac))) {
1055
      /* found exact match, return */
1056
      *ppeer = peer;
1057
      goto out;
1058
    }
1059
    else if(peer->ssl_peer_key) {
1060
      unsigned char my_hmac[CURL_SHA256_DIGEST_LENGTH];
1061
      /* compute hmac for the passed salt */
1062
      result = Curl_hmacit(&Curl_HMAC_SHA256,
1063
                           salt, sizeof(peer->key_salt),
1064
                           (const unsigned char *)peer->ssl_peer_key,
1065
                           strlen(peer->ssl_peer_key),
1066
                           my_hmac);
1067
      if(result)
1068
        goto out;
1069
      if(!memcmp(my_hmac, hmac, sizeof(my_hmac))) {
1070
        /* cryptohash match, take over salt+hmac if no set and return */
1071
        if(!peer->hmac_set) {
1072
          memcpy(peer->key_salt, salt, sizeof(peer->key_salt));
1073
          memcpy(peer->key_hmac, hmac, sizeof(peer->key_hmac));
1074
          peer->hmac_set = TRUE;
1075
        }
1076
        *ppeer = peer;
1077
        goto out;
1078
      }
1079
    }
1080
  }
1081
out:
1082
  return result;
1083
}
1084
1085
CURLcode Curl_ssl_session_import(struct Curl_easy *data,
1086
                                 const char *ssl_peer_key,
1087
                                 const unsigned char *shmac, size_t shmac_len,
1088
                                 const void *sdata, size_t sdata_len)
1089
{
1090
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
1091
  struct Curl_ssl_scache_peer *peer = NULL;
1092
  struct Curl_ssl_session *s = NULL;
1093
  bool locked = FALSE;
1094
  CURLcode r;
1095
1096
  if(!scache) {
1097
    r = CURLE_BAD_FUNCTION_ARGUMENT;
1098
    goto out;
1099
  }
1100
  if(!ssl_peer_key && (!shmac || !shmac_len)) {
1101
    r = CURLE_BAD_FUNCTION_ARGUMENT;
1102
    goto out;
1103
  }
1104
1105
  r = Curl_ssl_session_unpack(data, sdata, sdata_len, &s);
1106
  if(r)
1107
    goto out;
1108
1109
  Curl_ssl_scache_lock(data);
1110
  locked = TRUE;
1111
1112
  if(ssl_peer_key) {
1113
    r = cf_ssl_add_peer(data, scache, ssl_peer_key, NULL, &peer);
1114
    if(r)
1115
      goto out;
1116
  }
1117
  else if(shmac_len != (sizeof(peer->key_salt) + sizeof(peer->key_hmac))) {
1118
    /* Either salt+hmac was garbled by caller or is from a curl version
1119
     * that does things differently */
1120
    r = CURLE_BAD_FUNCTION_ARGUMENT;
1121
    goto out;
1122
  }
1123
  else {
1124
    const unsigned char *salt = shmac;
1125
    const unsigned char *hmac = shmac + sizeof(peer->key_salt);
1126
1127
    r = cf_ssl_find_peer_by_hmac(scache, salt, hmac, &peer);
1128
    if(r)
1129
      goto out;
1130
    if(!peer) {
1131
      peer = cf_ssl_get_free_peer(scache);
1132
      if(peer) {
1133
        r = cf_ssl_scache_peer_init(peer, ssl_peer_key, NULL,
1134
                                    NULL, NULL, salt, hmac);
1135
        if(r)
1136
          goto out;
1137
      }
1138
    }
1139
  }
1140
1141
  if(peer) {
1142
    cf_scache_peer_add_session(peer, s, time(NULL));
1143
    s = NULL; /* peer is now owner */
1144
    CURL_TRC_SSLS(data, "successfully imported ticket for peer %s, now "
1145
                  "with %zu tickets",
1146
                  peer->ssl_peer_key ? peer->ssl_peer_key : "without key",
1147
                  Curl_llist_count(&peer->sessions));
1148
  }
1149
1150
out:
1151
  if(locked)
1152
    Curl_ssl_scache_unlock(data);
1153
  Curl_ssl_session_destroy(s);
1154
  return r;
1155
}
1156
1157
CURLcode Curl_ssl_session_export(struct Curl_easy *data,
1158
                                 curl_ssls_export_cb *export_fn,
1159
                                 void *userptr)
1160
{
1161
  struct Curl_ssl_scache *scache = cf_ssl_scache_get(data);
1162
  struct Curl_ssl_scache_peer *peer;
1163
  struct dynbuf sbuf, hbuf;
1164
  struct Curl_llist_node *n;
1165
  size_t i, npeers = 0, ntickets = 0;
1166
  curl_off_t now = time(NULL);
1167
  CURLcode r = CURLE_OK;
1168
1169
  if(!export_fn)
1170
    return CURLE_BAD_FUNCTION_ARGUMENT;
1171
  if(!scache)
1172
    return CURLE_OK;
1173
1174
  Curl_ssl_scache_lock(data);
1175
1176
  curlx_dyn_init(&hbuf, (CURL_SHA256_DIGEST_LENGTH * 2) + 1);
1177
  curlx_dyn_init(&sbuf, CURL_SSL_TICKET_MAX);
1178
1179
  for(i = 0; scache && i < scache->peer_count; i++) {
1180
    peer = &scache->peers[i];
1181
    if(!peer->ssl_peer_key && !peer->hmac_set)
1182
      continue;  /* skip free entry */
1183
    if(!peer->exportable)
1184
      continue;
1185
1186
    curlx_dyn_reset(&hbuf);
1187
    cf_scache_peer_remove_expired(peer, now);
1188
    n = Curl_llist_head(&peer->sessions);
1189
    if(n)
1190
      ++npeers;
1191
    while(n) {
1192
      struct Curl_ssl_session *s = Curl_node_elem(n);
1193
      if(!peer->hmac_set) {
1194
        r = cf_ssl_scache_peer_set_hmac(peer);
1195
        if(r)
1196
          goto out;
1197
      }
1198
      if(!curlx_dyn_len(&hbuf)) {
1199
        r = curlx_dyn_addn(&hbuf, peer->key_salt, sizeof(peer->key_salt));
1200
        if(r)
1201
          goto out;
1202
        r = curlx_dyn_addn(&hbuf, peer->key_hmac, sizeof(peer->key_hmac));
1203
        if(r)
1204
          goto out;
1205
      }
1206
      curlx_dyn_reset(&sbuf);
1207
      r = Curl_ssl_session_pack(data, s, &sbuf);
1208
      if(r)
1209
        goto out;
1210
1211
      r = export_fn(data, userptr, peer->ssl_peer_key,
1212
                    curlx_dyn_uptr(&hbuf), curlx_dyn_len(&hbuf),
1213
                    curlx_dyn_uptr(&sbuf), curlx_dyn_len(&sbuf),
1214
                    s->valid_until, s->ietf_tls_id,
1215
                    s->alpn, s->earlydata_max);
1216
      if(r)
1217
        goto out;
1218
      ++ntickets;
1219
      n = Curl_node_next(n);
1220
    }
1221
1222
  }
1223
  r = CURLE_OK;
1224
  CURL_TRC_SSLS(data, "exported %zu session tickets for %zu peers",
1225
                ntickets, npeers);
1226
1227
out:
1228
  Curl_ssl_scache_unlock(data);
1229
  curlx_dyn_free(&hbuf);
1230
  curlx_dyn_free(&sbuf);
1231
  return r;
1232
}
1233
1234
#endif /* USE_SSLS_EXPORT */
1235
1236
#endif /* USE_SSL */