net_help.c revision 269257
1/*
2 * util/net_help.c - implementation of the network helper code
3 *
4 * Copyright (c) 2007, NLnet Labs. All rights reserved.
5 *
6 * This software is open source.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 *
12 * Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
14 *
15 * Redistributions in binary form must reproduce the above copyright notice,
16 * this list of conditions and the following disclaimer in the documentation
17 * and/or other materials provided with the distribution.
18 *
19 * Neither the name of the NLNET LABS nor the names of its contributors may
20 * be used to endorse or promote products derived from this software without
21 * specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
26 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
27 * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
28 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
29 * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
30 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34 */
35/**
36 * \file
37 * Implementation of net_help.h.
38 */
39
40#include "config.h"
41#include "util/net_help.h"
42#include "util/log.h"
43#include "util/data/dname.h"
44#include "util/module.h"
45#include "util/regional.h"
46#include "ldns/parseutil.h"
47#include "ldns/wire2str.h"
48#include <fcntl.h>
49#ifdef HAVE_OPENSSL_SSL_H
50#include <openssl/ssl.h>
51#endif
52#ifdef HAVE_OPENSSL_ERR_H
53#include <openssl/err.h>
54#endif
55
56/** max length of an IP address (the address portion) that we allow */
57#define MAX_ADDR_STRLEN 128 /* characters */
58/** default value for EDNS ADVERTISED size */
59uint16_t EDNS_ADVERTISED_SIZE = 4096;
60
61/** minimal responses when positive answer: default is no */
62int MINIMAL_RESPONSES = 0;
63
64/** rrset order roundrobin: default is no */
65int RRSET_ROUNDROBIN = 0;
66
67/* returns true is string addr is an ip6 specced address */
68int
69str_is_ip6(const char* str)
70{
71	if(strchr(str, ':'))
72		return 1;
73	else    return 0;
74}
75
76int
77fd_set_nonblock(int s)
78{
79#ifdef HAVE_FCNTL
80	int flag;
81	if((flag = fcntl(s, F_GETFL)) == -1) {
82		log_err("can't fcntl F_GETFL: %s", strerror(errno));
83		flag = 0;
84	}
85	flag |= O_NONBLOCK;
86	if(fcntl(s, F_SETFL, flag) == -1) {
87		log_err("can't fcntl F_SETFL: %s", strerror(errno));
88		return 0;
89	}
90#elif defined(HAVE_IOCTLSOCKET)
91	unsigned long on = 1;
92	if(ioctlsocket(s, FIONBIO, &on) != 0) {
93		log_err("can't ioctlsocket FIONBIO on: %s",
94			wsa_strerror(WSAGetLastError()));
95	}
96#endif
97	return 1;
98}
99
100int
101fd_set_block(int s)
102{
103#ifdef HAVE_FCNTL
104	int flag;
105	if((flag = fcntl(s, F_GETFL)) == -1) {
106		log_err("cannot fcntl F_GETFL: %s", strerror(errno));
107		flag = 0;
108	}
109	flag &= ~O_NONBLOCK;
110	if(fcntl(s, F_SETFL, flag) == -1) {
111		log_err("cannot fcntl F_SETFL: %s", strerror(errno));
112		return 0;
113	}
114#elif defined(HAVE_IOCTLSOCKET)
115	unsigned long off = 0;
116	if(ioctlsocket(s, FIONBIO, &off) != 0) {
117		log_err("can't ioctlsocket FIONBIO off: %s",
118			wsa_strerror(WSAGetLastError()));
119	}
120#endif
121	return 1;
122}
123
124int
125is_pow2(size_t num)
126{
127	if(num == 0) return 1;
128	return (num & (num-1)) == 0;
129}
130
131void*
132memdup(void* data, size_t len)
133{
134	void* d;
135	if(!data) return NULL;
136	if(len == 0) return NULL;
137	d = malloc(len);
138	if(!d) return NULL;
139	memcpy(d, data, len);
140	return d;
141}
142
143void
144log_addr(enum verbosity_value v, const char* str,
145	struct sockaddr_storage* addr, socklen_t addrlen)
146{
147	uint16_t port;
148	const char* family = "unknown";
149	char dest[100];
150	int af = (int)((struct sockaddr_in*)addr)->sin_family;
151	void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr;
152	if(verbosity < v)
153		return;
154	switch(af) {
155		case AF_INET: family="ip4"; break;
156		case AF_INET6: family="ip6";
157			sinaddr = &((struct sockaddr_in6*)addr)->sin6_addr;
158			break;
159		case AF_UNIX: family="unix"; break;
160		default: break;
161	}
162	if(inet_ntop(af, sinaddr, dest, (socklen_t)sizeof(dest)) == 0) {
163		(void)strlcpy(dest, "(inet_ntop error)", sizeof(dest));
164	}
165	dest[sizeof(dest)-1] = 0;
166	port = ntohs(((struct sockaddr_in*)addr)->sin_port);
167	if(verbosity >= 4)
168		verbose(v, "%s %s %s port %d (len %d)", str, family, dest,
169			(int)port, (int)addrlen);
170	else	verbose(v, "%s %s port %d", str, dest, (int)port);
171}
172
173int
174extstrtoaddr(const char* str, struct sockaddr_storage* addr,
175	socklen_t* addrlen)
176{
177	char* s;
178	int port = UNBOUND_DNS_PORT;
179	if((s=strchr(str, '@'))) {
180		char buf[MAX_ADDR_STRLEN];
181		if(s-str >= MAX_ADDR_STRLEN) {
182			return 0;
183		}
184		(void)strlcpy(buf, str, sizeof(buf));
185		buf[s-str] = 0;
186		port = atoi(s+1);
187		if(port == 0 && strcmp(s+1,"0")!=0) {
188			return 0;
189		}
190		return ipstrtoaddr(buf, port, addr, addrlen);
191	}
192	return ipstrtoaddr(str, port, addr, addrlen);
193}
194
195
196int
197ipstrtoaddr(const char* ip, int port, struct sockaddr_storage* addr,
198	socklen_t* addrlen)
199{
200	uint16_t p;
201	if(!ip) return 0;
202	p = (uint16_t) port;
203	if(str_is_ip6(ip)) {
204		char buf[MAX_ADDR_STRLEN];
205		char* s;
206		struct sockaddr_in6* sa = (struct sockaddr_in6*)addr;
207		*addrlen = (socklen_t)sizeof(struct sockaddr_in6);
208		memset(sa, 0, *addrlen);
209		sa->sin6_family = AF_INET6;
210		sa->sin6_port = (in_port_t)htons(p);
211		if((s=strchr(ip, '%'))) { /* ip6%interface, rfc 4007 */
212			if(s-ip >= MAX_ADDR_STRLEN)
213				return 0;
214			(void)strlcpy(buf, ip, sizeof(buf));
215			buf[s-ip]=0;
216			sa->sin6_scope_id = (uint32_t)atoi(s+1);
217			ip = buf;
218		}
219		if(inet_pton((int)sa->sin6_family, ip, &sa->sin6_addr) <= 0) {
220			return 0;
221		}
222	} else { /* ip4 */
223		struct sockaddr_in* sa = (struct sockaddr_in*)addr;
224		*addrlen = (socklen_t)sizeof(struct sockaddr_in);
225		memset(sa, 0, *addrlen);
226		sa->sin_family = AF_INET;
227		sa->sin_port = (in_port_t)htons(p);
228		if(inet_pton((int)sa->sin_family, ip, &sa->sin_addr) <= 0) {
229			return 0;
230		}
231	}
232	return 1;
233}
234
235int netblockstrtoaddr(const char* str, int port, struct sockaddr_storage* addr,
236        socklen_t* addrlen, int* net)
237{
238	char* s = NULL;
239	*net = (str_is_ip6(str)?128:32);
240	if((s=strchr(str, '/'))) {
241		if(atoi(s+1) > *net) {
242			log_err("netblock too large: %s", str);
243			return 0;
244		}
245		*net = atoi(s+1);
246		if(*net == 0 && strcmp(s+1, "0") != 0) {
247			log_err("cannot parse netblock: '%s'", str);
248			return 0;
249		}
250		if(!(s = strdup(str))) {
251			log_err("out of memory");
252			return 0;
253		}
254		*strchr(s, '/') = '\0';
255	}
256	if(!ipstrtoaddr(s?s:str, port, addr, addrlen)) {
257		free(s);
258		log_err("cannot parse ip address: '%s'", str);
259		return 0;
260	}
261	if(s) {
262		free(s);
263		addr_mask(addr, *addrlen, *net);
264	}
265	return 1;
266}
267
268void
269log_nametypeclass(enum verbosity_value v, const char* str, uint8_t* name,
270	uint16_t type, uint16_t dclass)
271{
272	char buf[LDNS_MAX_DOMAINLEN+1];
273	char t[12], c[12];
274	const char *ts, *cs;
275	if(verbosity < v)
276		return;
277	dname_str(name, buf);
278	if(type == LDNS_RR_TYPE_TSIG) ts = "TSIG";
279	else if(type == LDNS_RR_TYPE_IXFR) ts = "IXFR";
280	else if(type == LDNS_RR_TYPE_AXFR) ts = "AXFR";
281	else if(type == LDNS_RR_TYPE_MAILB) ts = "MAILB";
282	else if(type == LDNS_RR_TYPE_MAILA) ts = "MAILA";
283	else if(type == LDNS_RR_TYPE_ANY) ts = "ANY";
284	else if(sldns_rr_descript(type) && sldns_rr_descript(type)->_name)
285		ts = sldns_rr_descript(type)->_name;
286	else {
287		snprintf(t, sizeof(t), "TYPE%d", (int)type);
288		ts = t;
289	}
290	if(sldns_lookup_by_id(sldns_rr_classes, (int)dclass) &&
291		sldns_lookup_by_id(sldns_rr_classes, (int)dclass)->name)
292		cs = sldns_lookup_by_id(sldns_rr_classes, (int)dclass)->name;
293	else {
294		snprintf(c, sizeof(c), "CLASS%d", (int)dclass);
295		cs = c;
296	}
297	log_info("%s %s %s %s", str, buf, ts, cs);
298}
299
300void log_name_addr(enum verbosity_value v, const char* str, uint8_t* zone,
301	struct sockaddr_storage* addr, socklen_t addrlen)
302{
303	uint16_t port;
304	const char* family = "unknown_family ";
305	char namebuf[LDNS_MAX_DOMAINLEN+1];
306	char dest[100];
307	int af = (int)((struct sockaddr_in*)addr)->sin_family;
308	void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr;
309	if(verbosity < v)
310		return;
311	switch(af) {
312		case AF_INET: family=""; break;
313		case AF_INET6: family="";
314			sinaddr = &((struct sockaddr_in6*)addr)->sin6_addr;
315			break;
316		case AF_UNIX: family="unix_family "; break;
317		default: break;
318	}
319	if(inet_ntop(af, sinaddr, dest, (socklen_t)sizeof(dest)) == 0) {
320		(void)strlcpy(dest, "(inet_ntop error)", sizeof(dest));
321	}
322	dest[sizeof(dest)-1] = 0;
323	port = ntohs(((struct sockaddr_in*)addr)->sin_port);
324	dname_str(zone, namebuf);
325	if(af != AF_INET && af != AF_INET6)
326		verbose(v, "%s <%s> %s%s#%d (addrlen %d)",
327			str, namebuf, family, dest, (int)port, (int)addrlen);
328	else	verbose(v, "%s <%s> %s%s#%d",
329			str, namebuf, family, dest, (int)port);
330}
331
332int
333sockaddr_cmp(struct sockaddr_storage* addr1, socklen_t len1,
334	struct sockaddr_storage* addr2, socklen_t len2)
335{
336	struct sockaddr_in* p1_in = (struct sockaddr_in*)addr1;
337	struct sockaddr_in* p2_in = (struct sockaddr_in*)addr2;
338	struct sockaddr_in6* p1_in6 = (struct sockaddr_in6*)addr1;
339	struct sockaddr_in6* p2_in6 = (struct sockaddr_in6*)addr2;
340	if(len1 < len2)
341		return -1;
342	if(len1 > len2)
343		return 1;
344	log_assert(len1 == len2);
345	if( p1_in->sin_family < p2_in->sin_family)
346		return -1;
347	if( p1_in->sin_family > p2_in->sin_family)
348		return 1;
349	log_assert( p1_in->sin_family == p2_in->sin_family );
350	/* compare ip4 */
351	if( p1_in->sin_family == AF_INET ) {
352		/* just order it, ntohs not required */
353		if(p1_in->sin_port < p2_in->sin_port)
354			return -1;
355		if(p1_in->sin_port > p2_in->sin_port)
356			return 1;
357		log_assert(p1_in->sin_port == p2_in->sin_port);
358		return memcmp(&p1_in->sin_addr, &p2_in->sin_addr, INET_SIZE);
359	} else if (p1_in6->sin6_family == AF_INET6) {
360		/* just order it, ntohs not required */
361		if(p1_in6->sin6_port < p2_in6->sin6_port)
362			return -1;
363		if(p1_in6->sin6_port > p2_in6->sin6_port)
364			return 1;
365		log_assert(p1_in6->sin6_port == p2_in6->sin6_port);
366		return memcmp(&p1_in6->sin6_addr, &p2_in6->sin6_addr,
367			INET6_SIZE);
368	} else {
369		/* eek unknown type, perform this comparison for sanity. */
370		return memcmp(addr1, addr2, len1);
371	}
372}
373
374int
375sockaddr_cmp_addr(struct sockaddr_storage* addr1, socklen_t len1,
376	struct sockaddr_storage* addr2, socklen_t len2)
377{
378	struct sockaddr_in* p1_in = (struct sockaddr_in*)addr1;
379	struct sockaddr_in* p2_in = (struct sockaddr_in*)addr2;
380	struct sockaddr_in6* p1_in6 = (struct sockaddr_in6*)addr1;
381	struct sockaddr_in6* p2_in6 = (struct sockaddr_in6*)addr2;
382	if(len1 < len2)
383		return -1;
384	if(len1 > len2)
385		return 1;
386	log_assert(len1 == len2);
387	if( p1_in->sin_family < p2_in->sin_family)
388		return -1;
389	if( p1_in->sin_family > p2_in->sin_family)
390		return 1;
391	log_assert( p1_in->sin_family == p2_in->sin_family );
392	/* compare ip4 */
393	if( p1_in->sin_family == AF_INET ) {
394		return memcmp(&p1_in->sin_addr, &p2_in->sin_addr, INET_SIZE);
395	} else if (p1_in6->sin6_family == AF_INET6) {
396		return memcmp(&p1_in6->sin6_addr, &p2_in6->sin6_addr,
397			INET6_SIZE);
398	} else {
399		/* eek unknown type, perform this comparison for sanity. */
400		return memcmp(addr1, addr2, len1);
401	}
402}
403
404int
405addr_is_ip6(struct sockaddr_storage* addr, socklen_t len)
406{
407	if(len == (socklen_t)sizeof(struct sockaddr_in6) &&
408		((struct sockaddr_in6*)addr)->sin6_family == AF_INET6)
409		return 1;
410	else    return 0;
411}
412
413void
414addr_mask(struct sockaddr_storage* addr, socklen_t len, int net)
415{
416	uint8_t mask[8] = {0x0, 0x80, 0xc0, 0xe0, 0xf0, 0xf8, 0xfc, 0xfe};
417	int i, max;
418	uint8_t* s;
419	if(addr_is_ip6(addr, len)) {
420		s = (uint8_t*)&((struct sockaddr_in6*)addr)->sin6_addr;
421		max = 128;
422	} else {
423		s = (uint8_t*)&((struct sockaddr_in*)addr)->sin_addr;
424		max = 32;
425	}
426	if(net >= max)
427		return;
428	for(i=net/8+1; i<max/8; i++) {
429		s[i] = 0;
430	}
431	s[net/8] &= mask[net&0x7];
432}
433
434int
435addr_in_common(struct sockaddr_storage* addr1, int net1,
436	struct sockaddr_storage* addr2, int net2, socklen_t addrlen)
437{
438	int min = (net1<net2)?net1:net2;
439	int i, to;
440	int match = 0;
441	uint8_t* s1, *s2;
442	if(addr_is_ip6(addr1, addrlen)) {
443		s1 = (uint8_t*)&((struct sockaddr_in6*)addr1)->sin6_addr;
444		s2 = (uint8_t*)&((struct sockaddr_in6*)addr2)->sin6_addr;
445		to = 16;
446	} else {
447		s1 = (uint8_t*)&((struct sockaddr_in*)addr1)->sin_addr;
448		s2 = (uint8_t*)&((struct sockaddr_in*)addr2)->sin_addr;
449		to = 4;
450	}
451	/* match = bits_in_common(s1, s2, to); */
452	for(i=0; i<to; i++) {
453		if(s1[i] == s2[i]) {
454			match += 8;
455		} else {
456			uint8_t z = s1[i]^s2[i];
457			log_assert(z);
458			while(!(z&0x80)) {
459				match++;
460				z<<=1;
461			}
462			break;
463		}
464	}
465	if(match > min) match = min;
466	return match;
467}
468
469void
470addr_to_str(struct sockaddr_storage* addr, socklen_t addrlen,
471	char* buf, size_t len)
472{
473	int af = (int)((struct sockaddr_in*)addr)->sin_family;
474	void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr;
475	if(addr_is_ip6(addr, addrlen))
476		sinaddr = &((struct sockaddr_in6*)addr)->sin6_addr;
477	if(inet_ntop(af, sinaddr, buf, (socklen_t)len) == 0) {
478		snprintf(buf, len, "(inet_ntop_error)");
479	}
480}
481
482int
483addr_is_ip4mapped(struct sockaddr_storage* addr, socklen_t addrlen)
484{
485	/* prefix for ipv4 into ipv6 mapping is ::ffff:x.x.x.x */
486	const uint8_t map_prefix[16] =
487		{0,0,0,0,  0,0,0,0, 0,0,0xff,0xff, 0,0,0,0};
488	uint8_t* s;
489	if(!addr_is_ip6(addr, addrlen))
490		return 0;
491	/* s is 16 octet ipv6 address string */
492	s = (uint8_t*)&((struct sockaddr_in6*)addr)->sin6_addr;
493	return (memcmp(s, map_prefix, 12) == 0);
494}
495
496int addr_is_broadcast(struct sockaddr_storage* addr, socklen_t addrlen)
497{
498	int af = (int)((struct sockaddr_in*)addr)->sin_family;
499	void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr;
500	return af == AF_INET && addrlen>=(socklen_t)sizeof(struct sockaddr_in)
501		&& memcmp(sinaddr, "\377\377\377\377", 4) == 0;
502}
503
504int addr_is_any(struct sockaddr_storage* addr, socklen_t addrlen)
505{
506	int af = (int)((struct sockaddr_in*)addr)->sin_family;
507	void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr;
508	void* sin6addr = &((struct sockaddr_in6*)addr)->sin6_addr;
509	if(af == AF_INET && addrlen>=(socklen_t)sizeof(struct sockaddr_in)
510		&& memcmp(sinaddr, "\000\000\000\000", 4) == 0)
511		return 1;
512	else if(af==AF_INET6 && addrlen>=(socklen_t)sizeof(struct sockaddr_in6)
513		&& memcmp(sin6addr, "\000\000\000\000\000\000\000\000"
514		"\000\000\000\000\000\000\000\000", 16) == 0)
515		return 1;
516	return 0;
517}
518
519void sock_list_insert(struct sock_list** list, struct sockaddr_storage* addr,
520	socklen_t len, struct regional* region)
521{
522	struct sock_list* add = (struct sock_list*)regional_alloc(region,
523		sizeof(*add) - sizeof(add->addr) + (size_t)len);
524	if(!add) {
525		log_err("out of memory in socketlist insert");
526		return;
527	}
528	log_assert(list);
529	add->next = *list;
530	add->len = len;
531	*list = add;
532	if(len) memmove(&add->addr, addr, len);
533}
534
535void sock_list_prepend(struct sock_list** list, struct sock_list* add)
536{
537	struct sock_list* last = add;
538	if(!last)
539		return;
540	while(last->next)
541		last = last->next;
542	last->next = *list;
543	*list = add;
544}
545
546int sock_list_find(struct sock_list* list, struct sockaddr_storage* addr,
547        socklen_t len)
548{
549	while(list) {
550		if(len == list->len) {
551			if(len == 0 || sockaddr_cmp_addr(addr, len,
552				&list->addr, list->len) == 0)
553				return 1;
554		}
555		list = list->next;
556	}
557	return 0;
558}
559
560void sock_list_merge(struct sock_list** list, struct regional* region,
561	struct sock_list* add)
562{
563	struct sock_list* p;
564	for(p=add; p; p=p->next) {
565		if(!sock_list_find(*list, &p->addr, p->len))
566			sock_list_insert(list, &p->addr, p->len, region);
567	}
568}
569
570void
571log_crypto_err(const char* str)
572{
573#ifdef HAVE_SSL
574	/* error:[error code]:[library name]:[function name]:[reason string] */
575	char buf[128];
576	unsigned long e;
577	ERR_error_string_n(ERR_get_error(), buf, sizeof(buf));
578	log_err("%s crypto %s", str, buf);
579	while( (e=ERR_get_error()) ) {
580		ERR_error_string_n(e, buf, sizeof(buf));
581		log_err("and additionally crypto %s", buf);
582	}
583#else
584	(void)str;
585#endif /* HAVE_SSL */
586}
587
588void* listen_sslctx_create(char* key, char* pem, char* verifypem)
589{
590#ifdef HAVE_SSL
591	SSL_CTX* ctx = SSL_CTX_new(SSLv23_server_method());
592	if(!ctx) {
593		log_crypto_err("could not SSL_CTX_new");
594		return NULL;
595	}
596	/* no SSLv2 because has defects */
597	if(!(SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv2) & SSL_OP_NO_SSLv2)){
598		log_crypto_err("could not set SSL_OP_NO_SSLv2");
599		SSL_CTX_free(ctx);
600		return NULL;
601	}
602	if(!SSL_CTX_use_certificate_file(ctx, pem, SSL_FILETYPE_PEM)) {
603		log_err("error for cert file: %s", pem);
604		log_crypto_err("error in SSL_CTX use_certificate_file");
605		SSL_CTX_free(ctx);
606		return NULL;
607	}
608	if(!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM)) {
609		log_err("error for private key file: %s", key);
610		log_crypto_err("Error in SSL_CTX use_PrivateKey_file");
611		SSL_CTX_free(ctx);
612		return NULL;
613	}
614	if(!SSL_CTX_check_private_key(ctx)) {
615		log_err("error for key file: %s", key);
616		log_crypto_err("Error in SSL_CTX check_private_key");
617		SSL_CTX_free(ctx);
618		return NULL;
619	}
620
621	if(verifypem && verifypem[0]) {
622		if(!SSL_CTX_load_verify_locations(ctx, verifypem, NULL)) {
623			log_crypto_err("Error in SSL_CTX verify locations");
624			SSL_CTX_free(ctx);
625			return NULL;
626		}
627		SSL_CTX_set_client_CA_list(ctx, SSL_load_client_CA_file(
628			verifypem));
629		SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, NULL);
630	}
631	return ctx;
632#else
633	(void)key; (void)pem; (void)verifypem;
634	return NULL;
635#endif
636}
637
638void* connect_sslctx_create(char* key, char* pem, char* verifypem)
639{
640#ifdef HAVE_SSL
641	SSL_CTX* ctx = SSL_CTX_new(SSLv23_client_method());
642	if(!ctx) {
643		log_crypto_err("could not allocate SSL_CTX pointer");
644		return NULL;
645	}
646	if(!(SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv2) & SSL_OP_NO_SSLv2)) {
647		log_crypto_err("could not set SSL_OP_NO_SSLv2");
648		SSL_CTX_free(ctx);
649		return NULL;
650	}
651	if(key && key[0]) {
652		if(!SSL_CTX_use_certificate_file(ctx, pem, SSL_FILETYPE_PEM)) {
653			log_err("error in client certificate %s", pem);
654			log_crypto_err("error in certificate file");
655			SSL_CTX_free(ctx);
656			return NULL;
657		}
658		if(!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM)) {
659			log_err("error in client private key %s", key);
660			log_crypto_err("error in key file");
661			SSL_CTX_free(ctx);
662			return NULL;
663		}
664		if(!SSL_CTX_check_private_key(ctx)) {
665			log_err("error in client key %s", key);
666			log_crypto_err("error in SSL_CTX_check_private_key");
667			SSL_CTX_free(ctx);
668			return NULL;
669		}
670	}
671	if(verifypem && verifypem[0]) {
672		if(!SSL_CTX_load_verify_locations(ctx, verifypem, NULL) != 1) {
673			log_crypto_err("error in SSL_CTX verify");
674			SSL_CTX_free(ctx);
675			return NULL;
676		}
677		SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, NULL);
678	}
679	return ctx;
680#else
681	(void)key; (void)pem; (void)verifypem;
682	return NULL;
683#endif
684}
685
686void* incoming_ssl_fd(void* sslctx, int fd)
687{
688#ifdef HAVE_SSL
689	SSL* ssl = SSL_new((SSL_CTX*)sslctx);
690	if(!ssl) {
691		log_crypto_err("could not SSL_new");
692		return NULL;
693	}
694	SSL_set_accept_state(ssl);
695	(void)SSL_set_mode(ssl, SSL_MODE_AUTO_RETRY);
696	if(!SSL_set_fd(ssl, fd)) {
697		log_crypto_err("could not SSL_set_fd");
698		SSL_free(ssl);
699		return NULL;
700	}
701	return ssl;
702#else
703	(void)sslctx; (void)fd;
704	return NULL;
705#endif
706}
707
708void* outgoing_ssl_fd(void* sslctx, int fd)
709{
710#ifdef HAVE_SSL
711	SSL* ssl = SSL_new((SSL_CTX*)sslctx);
712	if(!ssl) {
713		log_crypto_err("could not SSL_new");
714		return NULL;
715	}
716	SSL_set_connect_state(ssl);
717	(void)SSL_set_mode(ssl, SSL_MODE_AUTO_RETRY);
718	if(!SSL_set_fd(ssl, fd)) {
719		log_crypto_err("could not SSL_set_fd");
720		SSL_free(ssl);
721		return NULL;
722	}
723	return ssl;
724#else
725	(void)sslctx; (void)fd;
726	return NULL;
727#endif
728}
729
730#if defined(HAVE_SSL) && defined(OPENSSL_THREADS) && !defined(THREADS_DISABLED)
731/** global lock list for openssl locks */
732static lock_basic_t *ub_openssl_locks = NULL;
733
734/** callback that gets thread id for openssl */
735static unsigned long
736ub_crypto_id_cb(void)
737{
738	return (unsigned long)ub_thread_self();
739}
740
741static void
742ub_crypto_lock_cb(int mode, int type, const char *ATTR_UNUSED(file),
743	int ATTR_UNUSED(line))
744{
745	if((mode&CRYPTO_LOCK)) {
746		lock_basic_lock(&ub_openssl_locks[type]);
747	} else {
748		lock_basic_unlock(&ub_openssl_locks[type]);
749	}
750}
751#endif /* OPENSSL_THREADS */
752
753int ub_openssl_lock_init(void)
754{
755#if defined(HAVE_SSL) && defined(OPENSSL_THREADS) && !defined(THREADS_DISABLED)
756	int i;
757	ub_openssl_locks = (lock_basic_t*)malloc(
758		sizeof(lock_basic_t)*CRYPTO_num_locks());
759	if(!ub_openssl_locks)
760		return 0;
761	for(i=0; i<CRYPTO_num_locks(); i++) {
762		lock_basic_init(&ub_openssl_locks[i]);
763	}
764	CRYPTO_set_id_callback(&ub_crypto_id_cb);
765	CRYPTO_set_locking_callback(&ub_crypto_lock_cb);
766#endif /* OPENSSL_THREADS */
767	return 1;
768}
769
770void ub_openssl_lock_delete(void)
771{
772#if defined(HAVE_SSL) && defined(OPENSSL_THREADS) && !defined(THREADS_DISABLED)
773	int i;
774	if(!ub_openssl_locks)
775		return;
776	CRYPTO_set_id_callback(NULL);
777	CRYPTO_set_locking_callback(NULL);
778	for(i=0; i<CRYPTO_num_locks(); i++) {
779		lock_basic_destroy(&ub_openssl_locks[i]);
780	}
781	free(ub_openssl_locks);
782#endif /* OPENSSL_THREADS */
783}
784
785