xref: /openbsd-src/usr.sbin/unbound/util/net_help.c (revision 897fc685943471cf985a0fe38ba076ea6fe74fa5)
1 /*
2  * util/net_help.c - implementation of the network helper code
3  *
4  * Copyright (c) 2007, NLnet Labs. All rights reserved.
5  *
6  * This software is open source.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * Redistributions of source code must retain the above copyright notice,
13  * this list of conditions and the following disclaimer.
14  *
15  * Redistributions in binary form must reproduce the above copyright notice,
16  * this list of conditions and the following disclaimer in the documentation
17  * and/or other materials provided with the distribution.
18  *
19  * Neither the name of the NLNET LABS nor the names of its contributors may
20  * be used to endorse or promote products derived from this software without
21  * specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
26  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
27  * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
28  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
29  * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
30  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34  */
35 /**
36  * \file
37  * Implementation of net_help.h.
38  */
39 
40 #include "config.h"
41 #include "util/net_help.h"
42 #include "util/log.h"
43 #include "util/data/dname.h"
44 #include "util/module.h"
45 #include "util/regional.h"
46 #include "sldns/parseutil.h"
47 #include "sldns/wire2str.h"
48 #include <fcntl.h>
49 #ifdef HAVE_OPENSSL_SSL_H
50 #include <openssl/ssl.h>
51 #endif
52 #ifdef HAVE_OPENSSL_ERR_H
53 #include <openssl/err.h>
54 #endif
55 
56 /** max length of an IP address (the address portion) that we allow */
57 #define MAX_ADDR_STRLEN 128 /* characters */
58 /** default value for EDNS ADVERTISED size */
59 uint16_t EDNS_ADVERTISED_SIZE = 4096;
60 
61 /** minimal responses when positive answer: default is no */
62 int MINIMAL_RESPONSES = 0;
63 
64 /** rrset order roundrobin: default is no */
65 int RRSET_ROUNDROBIN = 0;
66 
67 /* returns true is string addr is an ip6 specced address */
68 int
69 str_is_ip6(const char* str)
70 {
71 	if(strchr(str, ':'))
72 		return 1;
73 	else    return 0;
74 }
75 
76 int
77 fd_set_nonblock(int s)
78 {
79 #ifdef HAVE_FCNTL
80 	int flag;
81 	if((flag = fcntl(s, F_GETFL)) == -1) {
82 		log_err("can't fcntl F_GETFL: %s", strerror(errno));
83 		flag = 0;
84 	}
85 	flag |= O_NONBLOCK;
86 	if(fcntl(s, F_SETFL, flag) == -1) {
87 		log_err("can't fcntl F_SETFL: %s", strerror(errno));
88 		return 0;
89 	}
90 #elif defined(HAVE_IOCTLSOCKET)
91 	unsigned long on = 1;
92 	if(ioctlsocket(s, FIONBIO, &on) != 0) {
93 		log_err("can't ioctlsocket FIONBIO on: %s",
94 			wsa_strerror(WSAGetLastError()));
95 	}
96 #endif
97 	return 1;
98 }
99 
100 int
101 fd_set_block(int s)
102 {
103 #ifdef HAVE_FCNTL
104 	int flag;
105 	if((flag = fcntl(s, F_GETFL)) == -1) {
106 		log_err("cannot fcntl F_GETFL: %s", strerror(errno));
107 		flag = 0;
108 	}
109 	flag &= ~O_NONBLOCK;
110 	if(fcntl(s, F_SETFL, flag) == -1) {
111 		log_err("cannot fcntl F_SETFL: %s", strerror(errno));
112 		return 0;
113 	}
114 #elif defined(HAVE_IOCTLSOCKET)
115 	unsigned long off = 0;
116 	if(ioctlsocket(s, FIONBIO, &off) != 0) {
117 		if(WSAGetLastError() != WSAEINVAL || verbosity >= 4)
118 			log_err("can't ioctlsocket FIONBIO off: %s",
119 				wsa_strerror(WSAGetLastError()));
120 	}
121 #endif
122 	return 1;
123 }
124 
125 int
126 is_pow2(size_t num)
127 {
128 	if(num == 0) return 1;
129 	return (num & (num-1)) == 0;
130 }
131 
132 void*
133 memdup(void* data, size_t len)
134 {
135 	void* d;
136 	if(!data) return NULL;
137 	if(len == 0) return NULL;
138 	d = malloc(len);
139 	if(!d) return NULL;
140 	memcpy(d, data, len);
141 	return d;
142 }
143 
144 void
145 log_addr(enum verbosity_value v, const char* str,
146 	struct sockaddr_storage* addr, socklen_t addrlen)
147 {
148 	uint16_t port;
149 	const char* family = "unknown";
150 	char dest[100];
151 	int af = (int)((struct sockaddr_in*)addr)->sin_family;
152 	void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr;
153 	if(verbosity < v)
154 		return;
155 	switch(af) {
156 		case AF_INET: family="ip4"; break;
157 		case AF_INET6: family="ip6";
158 			sinaddr = &((struct sockaddr_in6*)addr)->sin6_addr;
159 			break;
160 		case AF_LOCAL:
161 			dest[0]=0;
162 			(void)inet_ntop(af, sinaddr, dest,
163 				(socklen_t)sizeof(dest));
164 			verbose(v, "%s local %s", str, dest);
165 			return; /* do not continue and try to get port */
166 		default: break;
167 	}
168 	if(inet_ntop(af, sinaddr, dest, (socklen_t)sizeof(dest)) == 0) {
169 		(void)strlcpy(dest, "(inet_ntop error)", sizeof(dest));
170 	}
171 	dest[sizeof(dest)-1] = 0;
172 	port = ntohs(((struct sockaddr_in*)addr)->sin_port);
173 	if(verbosity >= 4)
174 		verbose(v, "%s %s %s port %d (len %d)", str, family, dest,
175 			(int)port, (int)addrlen);
176 	else	verbose(v, "%s %s port %d", str, dest, (int)port);
177 }
178 
179 int
180 extstrtoaddr(const char* str, struct sockaddr_storage* addr,
181 	socklen_t* addrlen)
182 {
183 	char* s;
184 	int port = UNBOUND_DNS_PORT;
185 	if((s=strchr(str, '@'))) {
186 		char buf[MAX_ADDR_STRLEN];
187 		if(s-str >= MAX_ADDR_STRLEN) {
188 			return 0;
189 		}
190 		(void)strlcpy(buf, str, sizeof(buf));
191 		buf[s-str] = 0;
192 		port = atoi(s+1);
193 		if(port == 0 && strcmp(s+1,"0")!=0) {
194 			return 0;
195 		}
196 		return ipstrtoaddr(buf, port, addr, addrlen);
197 	}
198 	return ipstrtoaddr(str, port, addr, addrlen);
199 }
200 
201 
202 int
203 ipstrtoaddr(const char* ip, int port, struct sockaddr_storage* addr,
204 	socklen_t* addrlen)
205 {
206 	uint16_t p;
207 	if(!ip) return 0;
208 	p = (uint16_t) port;
209 	if(str_is_ip6(ip)) {
210 		char buf[MAX_ADDR_STRLEN];
211 		char* s;
212 		struct sockaddr_in6* sa = (struct sockaddr_in6*)addr;
213 		*addrlen = (socklen_t)sizeof(struct sockaddr_in6);
214 		memset(sa, 0, *addrlen);
215 		sa->sin6_family = AF_INET6;
216 		sa->sin6_port = (in_port_t)htons(p);
217 		if((s=strchr(ip, '%'))) { /* ip6%interface, rfc 4007 */
218 			if(s-ip >= MAX_ADDR_STRLEN)
219 				return 0;
220 			(void)strlcpy(buf, ip, sizeof(buf));
221 			buf[s-ip]=0;
222 			sa->sin6_scope_id = (uint32_t)atoi(s+1);
223 			ip = buf;
224 		}
225 		if(inet_pton((int)sa->sin6_family, ip, &sa->sin6_addr) <= 0) {
226 			return 0;
227 		}
228 	} else { /* ip4 */
229 		struct sockaddr_in* sa = (struct sockaddr_in*)addr;
230 		*addrlen = (socklen_t)sizeof(struct sockaddr_in);
231 		memset(sa, 0, *addrlen);
232 		sa->sin_family = AF_INET;
233 		sa->sin_port = (in_port_t)htons(p);
234 		if(inet_pton((int)sa->sin_family, ip, &sa->sin_addr) <= 0) {
235 			return 0;
236 		}
237 	}
238 	return 1;
239 }
240 
241 int netblockstrtoaddr(const char* str, int port, struct sockaddr_storage* addr,
242         socklen_t* addrlen, int* net)
243 {
244 	char* s = NULL;
245 	*net = (str_is_ip6(str)?128:32);
246 	if((s=strchr(str, '/'))) {
247 		if(atoi(s+1) > *net) {
248 			log_err("netblock too large: %s", str);
249 			return 0;
250 		}
251 		*net = atoi(s+1);
252 		if(*net == 0 && strcmp(s+1, "0") != 0) {
253 			log_err("cannot parse netblock: '%s'", str);
254 			return 0;
255 		}
256 		if(!(s = strdup(str))) {
257 			log_err("out of memory");
258 			return 0;
259 		}
260 		*strchr(s, '/') = '\0';
261 	}
262 	if(!ipstrtoaddr(s?s:str, port, addr, addrlen)) {
263 		free(s);
264 		log_err("cannot parse ip address: '%s'", str);
265 		return 0;
266 	}
267 	if(s) {
268 		free(s);
269 		addr_mask(addr, *addrlen, *net);
270 	}
271 	return 1;
272 }
273 
274 /** store port number into sockaddr structure */
275 void
276 sockaddr_store_port(struct sockaddr_storage* addr, socklen_t addrlen, int port)
277 {
278 	if(addr_is_ip6(addr, addrlen)) {
279 		struct sockaddr_in6* sa = (struct sockaddr_in6*)addr;
280 		sa->sin6_port = (in_port_t)htons((uint16_t)port);
281 	} else {
282 		struct sockaddr_in* sa = (struct sockaddr_in*)addr;
283 		sa->sin_port = (in_port_t)htons((uint16_t)port);
284 	}
285 }
286 
287 void
288 log_nametypeclass(enum verbosity_value v, const char* str, uint8_t* name,
289 	uint16_t type, uint16_t dclass)
290 {
291 	char buf[LDNS_MAX_DOMAINLEN+1];
292 	char t[12], c[12];
293 	const char *ts, *cs;
294 	if(verbosity < v)
295 		return;
296 	dname_str(name, buf);
297 	if(type == LDNS_RR_TYPE_TSIG) ts = "TSIG";
298 	else if(type == LDNS_RR_TYPE_IXFR) ts = "IXFR";
299 	else if(type == LDNS_RR_TYPE_AXFR) ts = "AXFR";
300 	else if(type == LDNS_RR_TYPE_MAILB) ts = "MAILB";
301 	else if(type == LDNS_RR_TYPE_MAILA) ts = "MAILA";
302 	else if(type == LDNS_RR_TYPE_ANY) ts = "ANY";
303 	else if(sldns_rr_descript(type) && sldns_rr_descript(type)->_name)
304 		ts = sldns_rr_descript(type)->_name;
305 	else {
306 		snprintf(t, sizeof(t), "TYPE%d", (int)type);
307 		ts = t;
308 	}
309 	if(sldns_lookup_by_id(sldns_rr_classes, (int)dclass) &&
310 		sldns_lookup_by_id(sldns_rr_classes, (int)dclass)->name)
311 		cs = sldns_lookup_by_id(sldns_rr_classes, (int)dclass)->name;
312 	else {
313 		snprintf(c, sizeof(c), "CLASS%d", (int)dclass);
314 		cs = c;
315 	}
316 	log_info("%s %s %s %s", str, buf, ts, cs);
317 }
318 
319 void log_name_addr(enum verbosity_value v, const char* str, uint8_t* zone,
320 	struct sockaddr_storage* addr, socklen_t addrlen)
321 {
322 	uint16_t port;
323 	const char* family = "unknown_family ";
324 	char namebuf[LDNS_MAX_DOMAINLEN+1];
325 	char dest[100];
326 	int af = (int)((struct sockaddr_in*)addr)->sin_family;
327 	void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr;
328 	if(verbosity < v)
329 		return;
330 	switch(af) {
331 		case AF_INET: family=""; break;
332 		case AF_INET6: family="";
333 			sinaddr = &((struct sockaddr_in6*)addr)->sin6_addr;
334 			break;
335 		case AF_LOCAL: family="local "; break;
336 		default: break;
337 	}
338 	if(inet_ntop(af, sinaddr, dest, (socklen_t)sizeof(dest)) == 0) {
339 		(void)strlcpy(dest, "(inet_ntop error)", sizeof(dest));
340 	}
341 	dest[sizeof(dest)-1] = 0;
342 	port = ntohs(((struct sockaddr_in*)addr)->sin_port);
343 	dname_str(zone, namebuf);
344 	if(af != AF_INET && af != AF_INET6)
345 		verbose(v, "%s <%s> %s%s#%d (addrlen %d)",
346 			str, namebuf, family, dest, (int)port, (int)addrlen);
347 	else	verbose(v, "%s <%s> %s%s#%d",
348 			str, namebuf, family, dest, (int)port);
349 }
350 
351 void log_err_addr(const char* str, const char* err,
352 	struct sockaddr_storage* addr, socklen_t addrlen)
353 {
354 	uint16_t port;
355 	char dest[100];
356 	int af = (int)((struct sockaddr_in*)addr)->sin_family;
357 	void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr;
358 	if(af == AF_INET6)
359 		sinaddr = &((struct sockaddr_in6*)addr)->sin6_addr;
360 	if(inet_ntop(af, sinaddr, dest, (socklen_t)sizeof(dest)) == 0) {
361 		(void)strlcpy(dest, "(inet_ntop error)", sizeof(dest));
362 	}
363 	dest[sizeof(dest)-1] = 0;
364 	port = ntohs(((struct sockaddr_in*)addr)->sin_port);
365 	if(verbosity >= 4)
366 		log_err("%s: %s for %s port %d (len %d)", str, err, dest,
367 			(int)port, (int)addrlen);
368 	else	log_err("%s: %s for %s", str, err, dest);
369 }
370 
371 int
372 sockaddr_cmp(struct sockaddr_storage* addr1, socklen_t len1,
373 	struct sockaddr_storage* addr2, socklen_t len2)
374 {
375 	struct sockaddr_in* p1_in = (struct sockaddr_in*)addr1;
376 	struct sockaddr_in* p2_in = (struct sockaddr_in*)addr2;
377 	struct sockaddr_in6* p1_in6 = (struct sockaddr_in6*)addr1;
378 	struct sockaddr_in6* p2_in6 = (struct sockaddr_in6*)addr2;
379 	if(len1 < len2)
380 		return -1;
381 	if(len1 > len2)
382 		return 1;
383 	log_assert(len1 == len2);
384 	if( p1_in->sin_family < p2_in->sin_family)
385 		return -1;
386 	if( p1_in->sin_family > p2_in->sin_family)
387 		return 1;
388 	log_assert( p1_in->sin_family == p2_in->sin_family );
389 	/* compare ip4 */
390 	if( p1_in->sin_family == AF_INET ) {
391 		/* just order it, ntohs not required */
392 		if(p1_in->sin_port < p2_in->sin_port)
393 			return -1;
394 		if(p1_in->sin_port > p2_in->sin_port)
395 			return 1;
396 		log_assert(p1_in->sin_port == p2_in->sin_port);
397 		return memcmp(&p1_in->sin_addr, &p2_in->sin_addr, INET_SIZE);
398 	} else if (p1_in6->sin6_family == AF_INET6) {
399 		/* just order it, ntohs not required */
400 		if(p1_in6->sin6_port < p2_in6->sin6_port)
401 			return -1;
402 		if(p1_in6->sin6_port > p2_in6->sin6_port)
403 			return 1;
404 		log_assert(p1_in6->sin6_port == p2_in6->sin6_port);
405 		return memcmp(&p1_in6->sin6_addr, &p2_in6->sin6_addr,
406 			INET6_SIZE);
407 	} else {
408 		/* eek unknown type, perform this comparison for sanity. */
409 		return memcmp(addr1, addr2, len1);
410 	}
411 }
412 
413 int
414 sockaddr_cmp_addr(struct sockaddr_storage* addr1, socklen_t len1,
415 	struct sockaddr_storage* addr2, socklen_t len2)
416 {
417 	struct sockaddr_in* p1_in = (struct sockaddr_in*)addr1;
418 	struct sockaddr_in* p2_in = (struct sockaddr_in*)addr2;
419 	struct sockaddr_in6* p1_in6 = (struct sockaddr_in6*)addr1;
420 	struct sockaddr_in6* p2_in6 = (struct sockaddr_in6*)addr2;
421 	if(len1 < len2)
422 		return -1;
423 	if(len1 > len2)
424 		return 1;
425 	log_assert(len1 == len2);
426 	if( p1_in->sin_family < p2_in->sin_family)
427 		return -1;
428 	if( p1_in->sin_family > p2_in->sin_family)
429 		return 1;
430 	log_assert( p1_in->sin_family == p2_in->sin_family );
431 	/* compare ip4 */
432 	if( p1_in->sin_family == AF_INET ) {
433 		return memcmp(&p1_in->sin_addr, &p2_in->sin_addr, INET_SIZE);
434 	} else if (p1_in6->sin6_family == AF_INET6) {
435 		return memcmp(&p1_in6->sin6_addr, &p2_in6->sin6_addr,
436 			INET6_SIZE);
437 	} else {
438 		/* eek unknown type, perform this comparison for sanity. */
439 		return memcmp(addr1, addr2, len1);
440 	}
441 }
442 
443 int
444 addr_is_ip6(struct sockaddr_storage* addr, socklen_t len)
445 {
446 	if(len == (socklen_t)sizeof(struct sockaddr_in6) &&
447 		((struct sockaddr_in6*)addr)->sin6_family == AF_INET6)
448 		return 1;
449 	else    return 0;
450 }
451 
452 void
453 addr_mask(struct sockaddr_storage* addr, socklen_t len, int net)
454 {
455 	uint8_t mask[8] = {0x0, 0x80, 0xc0, 0xe0, 0xf0, 0xf8, 0xfc, 0xfe};
456 	int i, max;
457 	uint8_t* s;
458 	if(addr_is_ip6(addr, len)) {
459 		s = (uint8_t*)&((struct sockaddr_in6*)addr)->sin6_addr;
460 		max = 128;
461 	} else {
462 		s = (uint8_t*)&((struct sockaddr_in*)addr)->sin_addr;
463 		max = 32;
464 	}
465 	if(net >= max)
466 		return;
467 	for(i=net/8+1; i<max/8; i++) {
468 		s[i] = 0;
469 	}
470 	s[net/8] &= mask[net&0x7];
471 }
472 
473 int
474 addr_in_common(struct sockaddr_storage* addr1, int net1,
475 	struct sockaddr_storage* addr2, int net2, socklen_t addrlen)
476 {
477 	int min = (net1<net2)?net1:net2;
478 	int i, to;
479 	int match = 0;
480 	uint8_t* s1, *s2;
481 	if(addr_is_ip6(addr1, addrlen)) {
482 		s1 = (uint8_t*)&((struct sockaddr_in6*)addr1)->sin6_addr;
483 		s2 = (uint8_t*)&((struct sockaddr_in6*)addr2)->sin6_addr;
484 		to = 16;
485 	} else {
486 		s1 = (uint8_t*)&((struct sockaddr_in*)addr1)->sin_addr;
487 		s2 = (uint8_t*)&((struct sockaddr_in*)addr2)->sin_addr;
488 		to = 4;
489 	}
490 	/* match = bits_in_common(s1, s2, to); */
491 	for(i=0; i<to; i++) {
492 		if(s1[i] == s2[i]) {
493 			match += 8;
494 		} else {
495 			uint8_t z = s1[i]^s2[i];
496 			log_assert(z);
497 			while(!(z&0x80)) {
498 				match++;
499 				z<<=1;
500 			}
501 			break;
502 		}
503 	}
504 	if(match > min) match = min;
505 	return match;
506 }
507 
508 void
509 addr_to_str(struct sockaddr_storage* addr, socklen_t addrlen,
510 	char* buf, size_t len)
511 {
512 	int af = (int)((struct sockaddr_in*)addr)->sin_family;
513 	void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr;
514 	if(addr_is_ip6(addr, addrlen))
515 		sinaddr = &((struct sockaddr_in6*)addr)->sin6_addr;
516 	if(inet_ntop(af, sinaddr, buf, (socklen_t)len) == 0) {
517 		snprintf(buf, len, "(inet_ntop_error)");
518 	}
519 }
520 
521 int
522 addr_is_ip4mapped(struct sockaddr_storage* addr, socklen_t addrlen)
523 {
524 	/* prefix for ipv4 into ipv6 mapping is ::ffff:x.x.x.x */
525 	const uint8_t map_prefix[16] =
526 		{0,0,0,0,  0,0,0,0, 0,0,0xff,0xff, 0,0,0,0};
527 	uint8_t* s;
528 	if(!addr_is_ip6(addr, addrlen))
529 		return 0;
530 	/* s is 16 octet ipv6 address string */
531 	s = (uint8_t*)&((struct sockaddr_in6*)addr)->sin6_addr;
532 	return (memcmp(s, map_prefix, 12) == 0);
533 }
534 
535 int addr_is_broadcast(struct sockaddr_storage* addr, socklen_t addrlen)
536 {
537 	int af = (int)((struct sockaddr_in*)addr)->sin_family;
538 	void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr;
539 	return af == AF_INET && addrlen>=(socklen_t)sizeof(struct sockaddr_in)
540 		&& memcmp(sinaddr, "\377\377\377\377", 4) == 0;
541 }
542 
543 int addr_is_any(struct sockaddr_storage* addr, socklen_t addrlen)
544 {
545 	int af = (int)((struct sockaddr_in*)addr)->sin_family;
546 	void* sinaddr = &((struct sockaddr_in*)addr)->sin_addr;
547 	void* sin6addr = &((struct sockaddr_in6*)addr)->sin6_addr;
548 	if(af == AF_INET && addrlen>=(socklen_t)sizeof(struct sockaddr_in)
549 		&& memcmp(sinaddr, "\000\000\000\000", 4) == 0)
550 		return 1;
551 	else if(af==AF_INET6 && addrlen>=(socklen_t)sizeof(struct sockaddr_in6)
552 		&& memcmp(sin6addr, "\000\000\000\000\000\000\000\000"
553 		"\000\000\000\000\000\000\000\000", 16) == 0)
554 		return 1;
555 	return 0;
556 }
557 
558 void sock_list_insert(struct sock_list** list, struct sockaddr_storage* addr,
559 	socklen_t len, struct regional* region)
560 {
561 	struct sock_list* add = (struct sock_list*)regional_alloc(region,
562 		sizeof(*add) - sizeof(add->addr) + (size_t)len);
563 	if(!add) {
564 		log_err("out of memory in socketlist insert");
565 		return;
566 	}
567 	log_assert(list);
568 	add->next = *list;
569 	add->len = len;
570 	*list = add;
571 	if(len) memmove(&add->addr, addr, len);
572 }
573 
574 void sock_list_prepend(struct sock_list** list, struct sock_list* add)
575 {
576 	struct sock_list* last = add;
577 	if(!last)
578 		return;
579 	while(last->next)
580 		last = last->next;
581 	last->next = *list;
582 	*list = add;
583 }
584 
585 int sock_list_find(struct sock_list* list, struct sockaddr_storage* addr,
586         socklen_t len)
587 {
588 	while(list) {
589 		if(len == list->len) {
590 			if(len == 0 || sockaddr_cmp_addr(addr, len,
591 				&list->addr, list->len) == 0)
592 				return 1;
593 		}
594 		list = list->next;
595 	}
596 	return 0;
597 }
598 
599 void sock_list_merge(struct sock_list** list, struct regional* region,
600 	struct sock_list* add)
601 {
602 	struct sock_list* p;
603 	for(p=add; p; p=p->next) {
604 		if(!sock_list_find(*list, &p->addr, p->len))
605 			sock_list_insert(list, &p->addr, p->len, region);
606 	}
607 }
608 
609 void
610 log_crypto_err(const char* str)
611 {
612 #ifdef HAVE_SSL
613 	/* error:[error code]:[library name]:[function name]:[reason string] */
614 	char buf[128];
615 	unsigned long e;
616 	ERR_error_string_n(ERR_get_error(), buf, sizeof(buf));
617 	log_err("%s crypto %s", str, buf);
618 	while( (e=ERR_get_error()) ) {
619 		ERR_error_string_n(e, buf, sizeof(buf));
620 		log_err("and additionally crypto %s", buf);
621 	}
622 #else
623 	(void)str;
624 #endif /* HAVE_SSL */
625 }
626 
627 int
628 listen_sslctx_setup(void* ctxt)
629 {
630 #ifdef HAVE_SSL
631 	SSL_CTX* ctx = (SSL_CTX*)ctxt;
632 	/* no SSLv2, SSLv3 because has defects */
633 	if((SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv2) & SSL_OP_NO_SSLv2)
634 		!= SSL_OP_NO_SSLv2){
635 		log_crypto_err("could not set SSL_OP_NO_SSLv2");
636 		return 0;
637 	}
638 	if((SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv3) & SSL_OP_NO_SSLv3)
639 		!= SSL_OP_NO_SSLv3){
640 		log_crypto_err("could not set SSL_OP_NO_SSLv3");
641 		return 0;
642 	}
643 #if defined(SSL_OP_NO_TLSv1) && defined(SSL_OP_NO_TLSv1_1)
644 	/* if we have tls 1.1 disable 1.0 */
645 	if((SSL_CTX_set_options(ctx, SSL_OP_NO_TLSv1) & SSL_OP_NO_TLSv1)
646 		!= SSL_OP_NO_TLSv1){
647 		log_crypto_err("could not set SSL_OP_NO_TLSv1");
648 		return 0;
649 	}
650 #endif
651 #if defined(SSL_OP_NO_TLSv1_1) && defined(SSL_OP_NO_TLSv1_2)
652 	/* if we have tls 1.2 disable 1.1 */
653 	if((SSL_CTX_set_options(ctx, SSL_OP_NO_TLSv1_1) & SSL_OP_NO_TLSv1_1)
654 		!= SSL_OP_NO_TLSv1_1){
655 		log_crypto_err("could not set SSL_OP_NO_TLSv1_1");
656 		return 0;
657 	}
658 #endif
659 #if defined(SHA256_DIGEST_LENGTH) && defined(USE_ECDSA)
660 	/* if we have sha256, set the cipher list to have no known vulns */
661 	if(!SSL_CTX_set_cipher_list(ctx, "TLS13-CHACHA20-POLY1305-SHA256:TLS13-AES-256-GCM-SHA384:TLS13-AES-128-GCM-SHA256:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256"))
662 		log_crypto_err("could not set cipher list with SSL_CTX_set_cipher_list");
663 #endif
664 
665 	if((SSL_CTX_set_options(ctx, SSL_OP_CIPHER_SERVER_PREFERENCE) &
666 		SSL_OP_CIPHER_SERVER_PREFERENCE) !=
667 		SSL_OP_CIPHER_SERVER_PREFERENCE) {
668 		log_crypto_err("could not set SSL_OP_CIPHER_SERVER_PREFERENCE");
669 		return 0;
670 	}
671 
672 #ifdef HAVE_SSL_CTX_SET_SECURITY_LEVEL
673 	SSL_CTX_set_security_level(ctx, 0);
674 #endif
675 #else
676 	(void)ctxt;
677 #endif /* HAVE_SSL */
678 	return 1;
679 }
680 
681 void
682 listen_sslctx_setup_2(void* ctxt)
683 {
684 #ifdef HAVE_SSL
685 	SSL_CTX* ctx = (SSL_CTX*)ctxt;
686 	(void)ctx;
687 #if HAVE_DECL_SSL_CTX_SET_ECDH_AUTO
688 	if(!SSL_CTX_set_ecdh_auto(ctx,1)) {
689 		log_crypto_err("Error in SSL_CTX_ecdh_auto, not enabling ECDHE");
690 	}
691 #elif defined(USE_ECDSA)
692 	if(1) {
693 		EC_KEY *ecdh = EC_KEY_new_by_curve_name (NID_X9_62_prime256v1);
694 		if (!ecdh) {
695 			log_crypto_err("could not find p256, not enabling ECDHE");
696 		} else {
697 			if (1 != SSL_CTX_set_tmp_ecdh (ctx, ecdh)) {
698 				log_crypto_err("Error in SSL_CTX_set_tmp_ecdh, not enabling ECDHE");
699 			}
700 			EC_KEY_free (ecdh);
701 		}
702 	}
703 #endif
704 #else
705 	(void)ctxt;
706 #endif /* HAVE_SSL */
707 }
708 
709 void* listen_sslctx_create(char* key, char* pem, char* verifypem)
710 {
711 #ifdef HAVE_SSL
712 	SSL_CTX* ctx = SSL_CTX_new(SSLv23_server_method());
713 	if(!ctx) {
714 		log_crypto_err("could not SSL_CTX_new");
715 		return NULL;
716 	}
717 	if(!listen_sslctx_setup(ctx)) {
718 		SSL_CTX_free(ctx);
719 		return NULL;
720 	}
721 	if(!SSL_CTX_use_certificate_chain_file(ctx, pem)) {
722 		log_err("error for cert file: %s", pem);
723 		log_crypto_err("error in SSL_CTX use_certificate_chain_file");
724 		SSL_CTX_free(ctx);
725 		return NULL;
726 	}
727 	if(!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM)) {
728 		log_err("error for private key file: %s", key);
729 		log_crypto_err("Error in SSL_CTX use_PrivateKey_file");
730 		SSL_CTX_free(ctx);
731 		return NULL;
732 	}
733 	if(!SSL_CTX_check_private_key(ctx)) {
734 		log_err("error for key file: %s", key);
735 		log_crypto_err("Error in SSL_CTX check_private_key");
736 		SSL_CTX_free(ctx);
737 		return NULL;
738 	}
739 	listen_sslctx_setup_2(ctx);
740 	if(verifypem && verifypem[0]) {
741 		if(!SSL_CTX_load_verify_locations(ctx, verifypem, NULL)) {
742 			log_crypto_err("Error in SSL_CTX verify locations");
743 			SSL_CTX_free(ctx);
744 			return NULL;
745 		}
746 		SSL_CTX_set_client_CA_list(ctx, SSL_load_client_CA_file(
747 			verifypem));
748 		SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, NULL);
749 	}
750 	return ctx;
751 #else
752 	(void)key; (void)pem; (void)verifypem;
753 	return NULL;
754 #endif
755 }
756 
757 void* connect_sslctx_create(char* key, char* pem, char* verifypem)
758 {
759 #ifdef HAVE_SSL
760 	SSL_CTX* ctx = SSL_CTX_new(SSLv23_client_method());
761 	if(!ctx) {
762 		log_crypto_err("could not allocate SSL_CTX pointer");
763 		return NULL;
764 	}
765 	if((SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv2) & SSL_OP_NO_SSLv2)
766 		!= SSL_OP_NO_SSLv2) {
767 		log_crypto_err("could not set SSL_OP_NO_SSLv2");
768 		SSL_CTX_free(ctx);
769 		return NULL;
770 	}
771 	if((SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv3) & SSL_OP_NO_SSLv3)
772 		!= SSL_OP_NO_SSLv3) {
773 		log_crypto_err("could not set SSL_OP_NO_SSLv3");
774 		SSL_CTX_free(ctx);
775 		return NULL;
776 	}
777 	if(key && key[0]) {
778 		if(!SSL_CTX_use_certificate_chain_file(ctx, pem)) {
779 			log_err("error in client certificate %s", pem);
780 			log_crypto_err("error in certificate file");
781 			SSL_CTX_free(ctx);
782 			return NULL;
783 		}
784 		if(!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM)) {
785 			log_err("error in client private key %s", key);
786 			log_crypto_err("error in key file");
787 			SSL_CTX_free(ctx);
788 			return NULL;
789 		}
790 		if(!SSL_CTX_check_private_key(ctx)) {
791 			log_err("error in client key %s", key);
792 			log_crypto_err("error in SSL_CTX_check_private_key");
793 			SSL_CTX_free(ctx);
794 			return NULL;
795 		}
796 	}
797 	if(verifypem && verifypem[0]) {
798 		if(!SSL_CTX_load_verify_locations(ctx, verifypem, NULL)) {
799 			log_crypto_err("error in SSL_CTX verify");
800 			SSL_CTX_free(ctx);
801 			return NULL;
802 		}
803 		SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, NULL);
804 	}
805 	return ctx;
806 #else
807 	(void)key; (void)pem; (void)verifypem;
808 	return NULL;
809 #endif
810 }
811 
812 void* incoming_ssl_fd(void* sslctx, int fd)
813 {
814 #ifdef HAVE_SSL
815 	SSL* ssl = SSL_new((SSL_CTX*)sslctx);
816 	if(!ssl) {
817 		log_crypto_err("could not SSL_new");
818 		return NULL;
819 	}
820 	SSL_set_accept_state(ssl);
821 	(void)SSL_set_mode(ssl, SSL_MODE_AUTO_RETRY);
822 	if(!SSL_set_fd(ssl, fd)) {
823 		log_crypto_err("could not SSL_set_fd");
824 		SSL_free(ssl);
825 		return NULL;
826 	}
827 	return ssl;
828 #else
829 	(void)sslctx; (void)fd;
830 	return NULL;
831 #endif
832 }
833 
834 void* outgoing_ssl_fd(void* sslctx, int fd)
835 {
836 #ifdef HAVE_SSL
837 	SSL* ssl = SSL_new((SSL_CTX*)sslctx);
838 	if(!ssl) {
839 		log_crypto_err("could not SSL_new");
840 		return NULL;
841 	}
842 	SSL_set_connect_state(ssl);
843 	(void)SSL_set_mode(ssl, SSL_MODE_AUTO_RETRY);
844 	if(!SSL_set_fd(ssl, fd)) {
845 		log_crypto_err("could not SSL_set_fd");
846 		SSL_free(ssl);
847 		return NULL;
848 	}
849 	return ssl;
850 #else
851 	(void)sslctx; (void)fd;
852 	return NULL;
853 #endif
854 }
855 
856 #if defined(HAVE_SSL) && defined(OPENSSL_THREADS) && !defined(THREADS_DISABLED) && defined(CRYPTO_LOCK) && OPENSSL_VERSION_NUMBER < 0x10100000L
857 /** global lock list for openssl locks */
858 static lock_basic_type *ub_openssl_locks = NULL;
859 
860 /** callback that gets thread id for openssl */
861 static unsigned long
862 ub_crypto_id_cb(void)
863 {
864 	return (unsigned long)log_thread_get();
865 }
866 
867 static void
868 ub_crypto_lock_cb(int mode, int type, const char *ATTR_UNUSED(file),
869 	int ATTR_UNUSED(line))
870 {
871 	if((mode&CRYPTO_LOCK)) {
872 		lock_basic_lock(&ub_openssl_locks[type]);
873 	} else {
874 		lock_basic_unlock(&ub_openssl_locks[type]);
875 	}
876 }
877 #endif /* OPENSSL_THREADS */
878 
879 int ub_openssl_lock_init(void)
880 {
881 #if defined(HAVE_SSL) && defined(OPENSSL_THREADS) && !defined(THREADS_DISABLED) && defined(CRYPTO_LOCK) && OPENSSL_VERSION_NUMBER < 0x10100000L
882 	int i;
883 	ub_openssl_locks = (lock_basic_type*)reallocarray(
884 		NULL, (size_t)CRYPTO_num_locks(), sizeof(lock_basic_type));
885 	if(!ub_openssl_locks)
886 		return 0;
887 	for(i=0; i<CRYPTO_num_locks(); i++) {
888 		lock_basic_init(&ub_openssl_locks[i]);
889 	}
890 	CRYPTO_set_id_callback(&ub_crypto_id_cb);
891 	CRYPTO_set_locking_callback(&ub_crypto_lock_cb);
892 #endif /* OPENSSL_THREADS */
893 	return 1;
894 }
895 
896 void ub_openssl_lock_delete(void)
897 {
898 #if defined(HAVE_SSL) && defined(OPENSSL_THREADS) && !defined(THREADS_DISABLED) && defined(CRYPTO_LOCK) && OPENSSL_VERSION_NUMBER < 0x10100000L
899 	int i;
900 	if(!ub_openssl_locks)
901 		return;
902 	CRYPTO_set_id_callback(NULL);
903 	CRYPTO_set_locking_callback(NULL);
904 	for(i=0; i<CRYPTO_num_locks(); i++) {
905 		lock_basic_destroy(&ub_openssl_locks[i]);
906 	}
907 	free(ub_openssl_locks);
908 #endif /* OPENSSL_THREADS */
909 }
910 
911