vtls.c 35 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329
  1. /***************************************************************************
  2. * _ _ ____ _
  3. * Project ___| | | | _ \| |
  4. * / __| | | | |_) | |
  5. * | (__| |_| | _ <| |___
  6. * \___|\___/|_| \_\_____|
  7. *
  8. * Copyright (C) 1998 - 2017, Daniel Stenberg, <daniel@haxx.se>, et al.
  9. *
  10. * This software is licensed as described in the file COPYING, which
  11. * you should have received as part of this distribution. The terms
  12. * are also available at https://curl.haxx.se/docs/copyright.html.
  13. *
  14. * You may opt to use, copy, modify, merge, publish, distribute and/or sell
  15. * copies of the Software, and permit persons to whom the Software is
  16. * furnished to do so, under the terms of the COPYING file.
  17. *
  18. * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
  19. * KIND, either express or implied.
  20. *
  21. ***************************************************************************/
  22. /* This file is for implementing all "generic" SSL functions that all libcurl
  23. internals should use. It is then responsible for calling the proper
  24. "backend" function.
  25. SSL-functions in libcurl should call functions in this source file, and not
  26. to any specific SSL-layer.
  27. Curl_ssl_ - prefix for generic ones
  28. Note that this source code uses the functions of the configured SSL
  29. backend via the global Curl_ssl instance.
  30. "SSL/TLS Strong Encryption: An Introduction"
  31. https://httpd.apache.org/docs/2.0/ssl/ssl_intro.html
  32. */
  33. #include "curl_setup.h"
  34. #ifdef HAVE_SYS_TYPES_H
  35. #include <sys/types.h>
  36. #endif
  37. #ifdef HAVE_SYS_STAT_H
  38. #include <sys/stat.h>
  39. #endif
  40. #ifdef HAVE_FCNTL_H
  41. #include <fcntl.h>
  42. #endif
  43. #include "urldata.h"
  44. #include "vtls.h" /* generic SSL protos etc */
  45. #include "slist.h"
  46. #include "sendf.h"
  47. #include "strcase.h"
  48. #include "url.h"
  49. #include "progress.h"
  50. #include "share.h"
  51. #include "multiif.h"
  52. #include "timeval.h"
  53. #include "curl_md5.h"
  54. #include "warnless.h"
  55. #include "curl_base64.h"
  56. #include "curl_printf.h"
  57. /* The last #include files should be: */
  58. #include "curl_memory.h"
  59. #include "memdebug.h"
  60. /* convenience macro to check if this handle is using a shared SSL session */
  61. #define SSLSESSION_SHARED(data) (data->share && \
  62. (data->share->specifier & \
  63. (1<<CURL_LOCK_DATA_SSL_SESSION)))
  64. #define CLONE_STRING(var) \
  65. if(source->var) { \
  66. dest->var = strdup(source->var); \
  67. if(!dest->var) \
  68. return FALSE; \
  69. } \
  70. else \
  71. dest->var = NULL;
  72. bool
  73. Curl_ssl_config_matches(struct ssl_primary_config* data,
  74. struct ssl_primary_config* needle)
  75. {
  76. if((data->version == needle->version) &&
  77. (data->version_max == needle->version_max) &&
  78. (data->verifypeer == needle->verifypeer) &&
  79. (data->verifyhost == needle->verifyhost) &&
  80. (data->verifystatus == needle->verifystatus) &&
  81. Curl_safe_strcasecompare(data->CApath, needle->CApath) &&
  82. Curl_safe_strcasecompare(data->CAfile, needle->CAfile) &&
  83. Curl_safe_strcasecompare(data->clientcert, needle->clientcert) &&
  84. Curl_safe_strcasecompare(data->random_file, needle->random_file) &&
  85. Curl_safe_strcasecompare(data->egdsocket, needle->egdsocket) &&
  86. Curl_safe_strcasecompare(data->cipher_list, needle->cipher_list))
  87. return TRUE;
  88. return FALSE;
  89. }
  90. bool
  91. Curl_clone_primary_ssl_config(struct ssl_primary_config *source,
  92. struct ssl_primary_config *dest)
  93. {
  94. dest->version = source->version;
  95. dest->version_max = source->version_max;
  96. dest->verifypeer = source->verifypeer;
  97. dest->verifyhost = source->verifyhost;
  98. dest->verifystatus = source->verifystatus;
  99. dest->sessionid = source->sessionid;
  100. CLONE_STRING(CApath);
  101. CLONE_STRING(CAfile);
  102. CLONE_STRING(clientcert);
  103. CLONE_STRING(random_file);
  104. CLONE_STRING(egdsocket);
  105. CLONE_STRING(cipher_list);
  106. return TRUE;
  107. }
  108. void Curl_free_primary_ssl_config(struct ssl_primary_config* sslc)
  109. {
  110. Curl_safefree(sslc->CApath);
  111. Curl_safefree(sslc->CAfile);
  112. Curl_safefree(sslc->clientcert);
  113. Curl_safefree(sslc->random_file);
  114. Curl_safefree(sslc->egdsocket);
  115. Curl_safefree(sslc->cipher_list);
  116. }
  117. #ifdef USE_SSL
  118. static int multissl_init(const struct Curl_ssl *backend);
  119. #endif
  120. int Curl_ssl_backend(void)
  121. {
  122. #ifdef USE_SSL
  123. multissl_init(NULL);
  124. return Curl_ssl->info.id;
  125. #else
  126. return (int)CURLSSLBACKEND_NONE;
  127. #endif
  128. }
  129. #ifdef USE_SSL
  130. /* "global" init done? */
  131. static bool init_ssl = FALSE;
  132. /**
  133. * Global SSL init
  134. *
  135. * @retval 0 error initializing SSL
  136. * @retval 1 SSL initialized successfully
  137. */
  138. int Curl_ssl_init(void)
  139. {
  140. /* make sure this is only done once */
  141. if(init_ssl)
  142. return 1;
  143. init_ssl = TRUE; /* never again */
  144. return Curl_ssl->init();
  145. }
  146. /* Global cleanup */
  147. void Curl_ssl_cleanup(void)
  148. {
  149. if(init_ssl) {
  150. /* only cleanup if we did a previous init */
  151. Curl_ssl->cleanup();
  152. init_ssl = FALSE;
  153. }
  154. }
  155. static bool ssl_prefs_check(struct Curl_easy *data)
  156. {
  157. /* check for CURLOPT_SSLVERSION invalid parameter value */
  158. const long sslver = data->set.ssl.primary.version;
  159. if((sslver < 0) || (sslver >= CURL_SSLVERSION_LAST)) {
  160. failf(data, "Unrecognized parameter value passed via CURLOPT_SSLVERSION");
  161. return FALSE;
  162. }
  163. switch(data->set.ssl.primary.version_max) {
  164. case CURL_SSLVERSION_MAX_NONE:
  165. case CURL_SSLVERSION_MAX_DEFAULT:
  166. break;
  167. default:
  168. if((data->set.ssl.primary.version_max >> 16) < sslver) {
  169. failf(data, "CURL_SSLVERSION_MAX incompatible with CURL_SSLVERSION");
  170. return FALSE;
  171. }
  172. }
  173. return TRUE;
  174. }
  175. static CURLcode
  176. ssl_connect_init_proxy(struct connectdata *conn, int sockindex)
  177. {
  178. DEBUGASSERT(conn->bits.proxy_ssl_connected[sockindex]);
  179. if(ssl_connection_complete == conn->ssl[sockindex].state &&
  180. !conn->proxy_ssl[sockindex].use) {
  181. struct ssl_backend_data *pbdata;
  182. if(!Curl_ssl->support_https_proxy)
  183. return CURLE_NOT_BUILT_IN;
  184. /* The pointers to the ssl backend data, which is opaque here, are swapped
  185. rather than move the contents. */
  186. pbdata = conn->proxy_ssl[sockindex].backend;
  187. conn->proxy_ssl[sockindex] = conn->ssl[sockindex];
  188. memset(&conn->ssl[sockindex], 0, sizeof(conn->ssl[sockindex]));
  189. memset(pbdata, 0, Curl_ssl->sizeof_ssl_backend_data);
  190. conn->ssl[sockindex].backend = pbdata;
  191. }
  192. return CURLE_OK;
  193. }
  194. CURLcode
  195. Curl_ssl_connect(struct connectdata *conn, int sockindex)
  196. {
  197. CURLcode result;
  198. if(conn->bits.proxy_ssl_connected[sockindex]) {
  199. result = ssl_connect_init_proxy(conn, sockindex);
  200. if(result)
  201. return result;
  202. }
  203. if(!ssl_prefs_check(conn->data))
  204. return CURLE_SSL_CONNECT_ERROR;
  205. /* mark this is being ssl-enabled from here on. */
  206. conn->ssl[sockindex].use = TRUE;
  207. conn->ssl[sockindex].state = ssl_connection_negotiating;
  208. result = Curl_ssl->connect(conn, sockindex);
  209. if(!result)
  210. Curl_pgrsTime(conn->data, TIMER_APPCONNECT); /* SSL is connected */
  211. return result;
  212. }
  213. CURLcode
  214. Curl_ssl_connect_nonblocking(struct connectdata *conn, int sockindex,
  215. bool *done)
  216. {
  217. CURLcode result;
  218. if(conn->bits.proxy_ssl_connected[sockindex]) {
  219. result = ssl_connect_init_proxy(conn, sockindex);
  220. if(result)
  221. return result;
  222. }
  223. if(!ssl_prefs_check(conn->data))
  224. return CURLE_SSL_CONNECT_ERROR;
  225. /* mark this is being ssl requested from here on. */
  226. conn->ssl[sockindex].use = TRUE;
  227. result = Curl_ssl->connect_nonblocking(conn, sockindex, done);
  228. if(!result && *done)
  229. Curl_pgrsTime(conn->data, TIMER_APPCONNECT); /* SSL is connected */
  230. return result;
  231. }
  232. /*
  233. * Lock shared SSL session data
  234. */
  235. void Curl_ssl_sessionid_lock(struct connectdata *conn)
  236. {
  237. if(SSLSESSION_SHARED(conn->data))
  238. Curl_share_lock(conn->data,
  239. CURL_LOCK_DATA_SSL_SESSION, CURL_LOCK_ACCESS_SINGLE);
  240. }
  241. /*
  242. * Unlock shared SSL session data
  243. */
  244. void Curl_ssl_sessionid_unlock(struct connectdata *conn)
  245. {
  246. if(SSLSESSION_SHARED(conn->data))
  247. Curl_share_unlock(conn->data, CURL_LOCK_DATA_SSL_SESSION);
  248. }
  249. /*
  250. * Check if there's a session ID for the given connection in the cache, and if
  251. * there's one suitable, it is provided. Returns TRUE when no entry matched.
  252. */
  253. bool Curl_ssl_getsessionid(struct connectdata *conn,
  254. void **ssl_sessionid,
  255. size_t *idsize, /* set 0 if unknown */
  256. int sockindex)
  257. {
  258. struct curl_ssl_session *check;
  259. struct Curl_easy *data = conn->data;
  260. size_t i;
  261. long *general_age;
  262. bool no_match = TRUE;
  263. const bool isProxy = CONNECT_PROXY_SSL();
  264. struct ssl_primary_config * const ssl_config = isProxy ?
  265. &conn->proxy_ssl_config :
  266. &conn->ssl_config;
  267. const char * const name = isProxy ? conn->http_proxy.host.name :
  268. conn->host.name;
  269. int port = isProxy ? (int)conn->port : conn->remote_port;
  270. *ssl_sessionid = NULL;
  271. DEBUGASSERT(SSL_SET_OPTION(primary.sessionid));
  272. if(!SSL_SET_OPTION(primary.sessionid))
  273. /* session ID re-use is disabled */
  274. return TRUE;
  275. /* Lock if shared */
  276. if(SSLSESSION_SHARED(data))
  277. general_age = &data->share->sessionage;
  278. else
  279. general_age = &data->state.sessionage;
  280. for(i = 0; i < data->set.general_ssl.max_ssl_sessions; i++) {
  281. check = &data->state.session[i];
  282. if(!check->sessionid)
  283. /* not session ID means blank entry */
  284. continue;
  285. if(strcasecompare(name, check->name) &&
  286. ((!conn->bits.conn_to_host && !check->conn_to_host) ||
  287. (conn->bits.conn_to_host && check->conn_to_host &&
  288. strcasecompare(conn->conn_to_host.name, check->conn_to_host))) &&
  289. ((!conn->bits.conn_to_port && check->conn_to_port == -1) ||
  290. (conn->bits.conn_to_port && check->conn_to_port != -1 &&
  291. conn->conn_to_port == check->conn_to_port)) &&
  292. (port == check->remote_port) &&
  293. strcasecompare(conn->handler->scheme, check->scheme) &&
  294. Curl_ssl_config_matches(ssl_config, &check->ssl_config)) {
  295. /* yes, we have a session ID! */
  296. (*general_age)++; /* increase general age */
  297. check->age = *general_age; /* set this as used in this age */
  298. *ssl_sessionid = check->sessionid;
  299. if(idsize)
  300. *idsize = check->idsize;
  301. no_match = FALSE;
  302. break;
  303. }
  304. }
  305. return no_match;
  306. }
  307. /*
  308. * Kill a single session ID entry in the cache.
  309. */
  310. void Curl_ssl_kill_session(struct curl_ssl_session *session)
  311. {
  312. if(session->sessionid) {
  313. /* defensive check */
  314. /* free the ID the SSL-layer specific way */
  315. Curl_ssl->session_free(session->sessionid);
  316. session->sessionid = NULL;
  317. session->age = 0; /* fresh */
  318. Curl_free_primary_ssl_config(&session->ssl_config);
  319. Curl_safefree(session->name);
  320. Curl_safefree(session->conn_to_host);
  321. }
  322. }
  323. /*
  324. * Delete the given session ID from the cache.
  325. */
  326. void Curl_ssl_delsessionid(struct connectdata *conn, void *ssl_sessionid)
  327. {
  328. size_t i;
  329. struct Curl_easy *data = conn->data;
  330. for(i = 0; i < data->set.general_ssl.max_ssl_sessions; i++) {
  331. struct curl_ssl_session *check = &data->state.session[i];
  332. if(check->sessionid == ssl_sessionid) {
  333. Curl_ssl_kill_session(check);
  334. break;
  335. }
  336. }
  337. }
  338. /*
  339. * Store session id in the session cache. The ID passed on to this function
  340. * must already have been extracted and allocated the proper way for the SSL
  341. * layer. Curl_XXXX_session_free() will be called to free/kill the session ID
  342. * later on.
  343. */
  344. CURLcode Curl_ssl_addsessionid(struct connectdata *conn,
  345. void *ssl_sessionid,
  346. size_t idsize,
  347. int sockindex)
  348. {
  349. size_t i;
  350. struct Curl_easy *data = conn->data; /* the mother of all structs */
  351. struct curl_ssl_session *store = &data->state.session[0];
  352. long oldest_age = data->state.session[0].age; /* zero if unused */
  353. char *clone_host;
  354. char *clone_conn_to_host;
  355. int conn_to_port;
  356. long *general_age;
  357. const bool isProxy = CONNECT_PROXY_SSL();
  358. struct ssl_primary_config * const ssl_config = isProxy ?
  359. &conn->proxy_ssl_config :
  360. &conn->ssl_config;
  361. DEBUGASSERT(SSL_SET_OPTION(primary.sessionid));
  362. clone_host = strdup(isProxy ? conn->http_proxy.host.name : conn->host.name);
  363. if(!clone_host)
  364. return CURLE_OUT_OF_MEMORY; /* bail out */
  365. if(conn->bits.conn_to_host) {
  366. clone_conn_to_host = strdup(conn->conn_to_host.name);
  367. if(!clone_conn_to_host) {
  368. free(clone_host);
  369. return CURLE_OUT_OF_MEMORY; /* bail out */
  370. }
  371. }
  372. else
  373. clone_conn_to_host = NULL;
  374. if(conn->bits.conn_to_port)
  375. conn_to_port = conn->conn_to_port;
  376. else
  377. conn_to_port = -1;
  378. /* Now we should add the session ID and the host name to the cache, (remove
  379. the oldest if necessary) */
  380. /* If using shared SSL session, lock! */
  381. if(SSLSESSION_SHARED(data)) {
  382. general_age = &data->share->sessionage;
  383. }
  384. else {
  385. general_age = &data->state.sessionage;
  386. }
  387. /* find an empty slot for us, or find the oldest */
  388. for(i = 1; (i < data->set.general_ssl.max_ssl_sessions) &&
  389. data->state.session[i].sessionid; i++) {
  390. if(data->state.session[i].age < oldest_age) {
  391. oldest_age = data->state.session[i].age;
  392. store = &data->state.session[i];
  393. }
  394. }
  395. if(i == data->set.general_ssl.max_ssl_sessions)
  396. /* cache is full, we must "kill" the oldest entry! */
  397. Curl_ssl_kill_session(store);
  398. else
  399. store = &data->state.session[i]; /* use this slot */
  400. /* now init the session struct wisely */
  401. store->sessionid = ssl_sessionid;
  402. store->idsize = idsize;
  403. store->age = *general_age; /* set current age */
  404. /* free it if there's one already present */
  405. free(store->name);
  406. free(store->conn_to_host);
  407. store->name = clone_host; /* clone host name */
  408. store->conn_to_host = clone_conn_to_host; /* clone connect to host name */
  409. store->conn_to_port = conn_to_port; /* connect to port number */
  410. /* port number */
  411. store->remote_port = isProxy ? (int)conn->port : conn->remote_port;
  412. store->scheme = conn->handler->scheme;
  413. if(!Curl_clone_primary_ssl_config(ssl_config, &store->ssl_config)) {
  414. store->sessionid = NULL; /* let caller free sessionid */
  415. free(clone_host);
  416. free(clone_conn_to_host);
  417. return CURLE_OUT_OF_MEMORY;
  418. }
  419. return CURLE_OK;
  420. }
  421. void Curl_ssl_close_all(struct Curl_easy *data)
  422. {
  423. size_t i;
  424. /* kill the session ID cache if not shared */
  425. if(data->state.session && !SSLSESSION_SHARED(data)) {
  426. for(i = 0; i < data->set.general_ssl.max_ssl_sessions; i++)
  427. /* the single-killer function handles empty table slots */
  428. Curl_ssl_kill_session(&data->state.session[i]);
  429. /* free the cache data */
  430. Curl_safefree(data->state.session);
  431. }
  432. Curl_ssl->close_all(data);
  433. }
  434. #if defined(USE_OPENSSL) || defined(USE_GNUTLS) || defined(USE_SCHANNEL) || \
  435. defined(USE_DARWINSSL) || defined(USE_POLARSSL) || defined(USE_NSS) || \
  436. defined(USE_MBEDTLS)
  437. int Curl_ssl_getsock(struct connectdata *conn, curl_socket_t *socks,
  438. int numsocks)
  439. {
  440. struct ssl_connect_data *connssl = &conn->ssl[FIRSTSOCKET];
  441. if(!numsocks)
  442. return GETSOCK_BLANK;
  443. if(connssl->connecting_state == ssl_connect_2_writing) {
  444. /* write mode */
  445. socks[0] = conn->sock[FIRSTSOCKET];
  446. return GETSOCK_WRITESOCK(0);
  447. }
  448. if(connssl->connecting_state == ssl_connect_2_reading) {
  449. /* read mode */
  450. socks[0] = conn->sock[FIRSTSOCKET];
  451. return GETSOCK_READSOCK(0);
  452. }
  453. return GETSOCK_BLANK;
  454. }
  455. #else
  456. int Curl_ssl_getsock(struct connectdata *conn,
  457. curl_socket_t *socks,
  458. int numsocks)
  459. {
  460. (void)conn;
  461. (void)socks;
  462. (void)numsocks;
  463. return GETSOCK_BLANK;
  464. }
  465. /* USE_OPENSSL || USE_GNUTLS || USE_SCHANNEL || USE_DARWINSSL || USE_NSS */
  466. #endif
  467. void Curl_ssl_close(struct connectdata *conn, int sockindex)
  468. {
  469. DEBUGASSERT((sockindex <= 1) && (sockindex >= -1));
  470. Curl_ssl->close_one(conn, sockindex);
  471. }
  472. CURLcode Curl_ssl_shutdown(struct connectdata *conn, int sockindex)
  473. {
  474. if(Curl_ssl->shutdown(conn, sockindex))
  475. return CURLE_SSL_SHUTDOWN_FAILED;
  476. conn->ssl[sockindex].use = FALSE; /* get back to ordinary socket usage */
  477. conn->ssl[sockindex].state = ssl_connection_none;
  478. conn->recv[sockindex] = Curl_recv_plain;
  479. conn->send[sockindex] = Curl_send_plain;
  480. return CURLE_OK;
  481. }
  482. /* Selects an SSL crypto engine
  483. */
  484. CURLcode Curl_ssl_set_engine(struct Curl_easy *data, const char *engine)
  485. {
  486. return Curl_ssl->set_engine(data, engine);
  487. }
  488. /* Selects the default SSL crypto engine
  489. */
  490. CURLcode Curl_ssl_set_engine_default(struct Curl_easy *data)
  491. {
  492. return Curl_ssl->set_engine_default(data);
  493. }
  494. /* Return list of OpenSSL crypto engine names. */
  495. struct curl_slist *Curl_ssl_engines_list(struct Curl_easy *data)
  496. {
  497. return Curl_ssl->engines_list(data);
  498. }
  499. /*
  500. * This sets up a session ID cache to the specified size. Make sure this code
  501. * is agnostic to what underlying SSL technology we use.
  502. */
  503. CURLcode Curl_ssl_initsessions(struct Curl_easy *data, size_t amount)
  504. {
  505. struct curl_ssl_session *session;
  506. if(data->state.session)
  507. /* this is just a precaution to prevent multiple inits */
  508. return CURLE_OK;
  509. session = calloc(amount, sizeof(struct curl_ssl_session));
  510. if(!session)
  511. return CURLE_OUT_OF_MEMORY;
  512. /* store the info in the SSL section */
  513. data->set.general_ssl.max_ssl_sessions = amount;
  514. data->state.session = session;
  515. data->state.sessionage = 1; /* this is brand new */
  516. return CURLE_OK;
  517. }
  518. static size_t Curl_multissl_version(char *buffer, size_t size);
  519. size_t Curl_ssl_version(char *buffer, size_t size)
  520. {
  521. #ifdef CURL_WITH_MULTI_SSL
  522. return Curl_multissl_version(buffer, size);
  523. #else
  524. return Curl_ssl->version(buffer, size);
  525. #endif
  526. }
  527. /*
  528. * This function tries to determine connection status.
  529. *
  530. * Return codes:
  531. * 1 means the connection is still in place
  532. * 0 means the connection has been closed
  533. * -1 means the connection status is unknown
  534. */
  535. int Curl_ssl_check_cxn(struct connectdata *conn)
  536. {
  537. return Curl_ssl->check_cxn(conn);
  538. }
  539. bool Curl_ssl_data_pending(const struct connectdata *conn,
  540. int connindex)
  541. {
  542. return Curl_ssl->data_pending(conn, connindex);
  543. }
  544. void Curl_ssl_free_certinfo(struct Curl_easy *data)
  545. {
  546. int i;
  547. struct curl_certinfo *ci = &data->info.certs;
  548. if(ci->num_of_certs) {
  549. /* free all individual lists used */
  550. for(i = 0; i<ci->num_of_certs; i++) {
  551. curl_slist_free_all(ci->certinfo[i]);
  552. ci->certinfo[i] = NULL;
  553. }
  554. free(ci->certinfo); /* free the actual array too */
  555. ci->certinfo = NULL;
  556. ci->num_of_certs = 0;
  557. }
  558. }
  559. CURLcode Curl_ssl_init_certinfo(struct Curl_easy *data, int num)
  560. {
  561. struct curl_certinfo *ci = &data->info.certs;
  562. struct curl_slist **table;
  563. /* Free any previous certificate information structures */
  564. Curl_ssl_free_certinfo(data);
  565. /* Allocate the required certificate information structures */
  566. table = calloc((size_t) num, sizeof(struct curl_slist *));
  567. if(!table)
  568. return CURLE_OUT_OF_MEMORY;
  569. ci->num_of_certs = num;
  570. ci->certinfo = table;
  571. return CURLE_OK;
  572. }
  573. /*
  574. * 'value' is NOT a zero terminated string
  575. */
  576. CURLcode Curl_ssl_push_certinfo_len(struct Curl_easy *data,
  577. int certnum,
  578. const char *label,
  579. const char *value,
  580. size_t valuelen)
  581. {
  582. struct curl_certinfo *ci = &data->info.certs;
  583. char *output;
  584. struct curl_slist *nl;
  585. CURLcode result = CURLE_OK;
  586. size_t labellen = strlen(label);
  587. size_t outlen = labellen + 1 + valuelen + 1; /* label:value\0 */
  588. output = malloc(outlen);
  589. if(!output)
  590. return CURLE_OUT_OF_MEMORY;
  591. /* sprintf the label and colon */
  592. snprintf(output, outlen, "%s:", label);
  593. /* memcpy the value (it might not be zero terminated) */
  594. memcpy(&output[labellen + 1], value, valuelen);
  595. /* zero terminate the output */
  596. output[labellen + 1 + valuelen] = 0;
  597. nl = Curl_slist_append_nodup(ci->certinfo[certnum], output);
  598. if(!nl) {
  599. free(output);
  600. curl_slist_free_all(ci->certinfo[certnum]);
  601. result = CURLE_OUT_OF_MEMORY;
  602. }
  603. ci->certinfo[certnum] = nl;
  604. return result;
  605. }
  606. /*
  607. * This is a convenience function for push_certinfo_len that takes a zero
  608. * terminated value.
  609. */
  610. CURLcode Curl_ssl_push_certinfo(struct Curl_easy *data,
  611. int certnum,
  612. const char *label,
  613. const char *value)
  614. {
  615. size_t valuelen = strlen(value);
  616. return Curl_ssl_push_certinfo_len(data, certnum, label, value, valuelen);
  617. }
  618. CURLcode Curl_ssl_random(struct Curl_easy *data,
  619. unsigned char *entropy,
  620. size_t length)
  621. {
  622. return Curl_ssl->random(data, entropy, length);
  623. }
  624. /*
  625. * Public key pem to der conversion
  626. */
  627. static CURLcode pubkey_pem_to_der(const char *pem,
  628. unsigned char **der, size_t *der_len)
  629. {
  630. char *stripped_pem, *begin_pos, *end_pos;
  631. size_t pem_count, stripped_pem_count = 0, pem_len;
  632. CURLcode result;
  633. /* if no pem, exit. */
  634. if(!pem)
  635. return CURLE_BAD_CONTENT_ENCODING;
  636. begin_pos = strstr(pem, "-----BEGIN PUBLIC KEY-----");
  637. if(!begin_pos)
  638. return CURLE_BAD_CONTENT_ENCODING;
  639. pem_count = begin_pos - pem;
  640. /* Invalid if not at beginning AND not directly following \n */
  641. if(0 != pem_count && '\n' != pem[pem_count - 1])
  642. return CURLE_BAD_CONTENT_ENCODING;
  643. /* 26 is length of "-----BEGIN PUBLIC KEY-----" */
  644. pem_count += 26;
  645. /* Invalid if not directly following \n */
  646. end_pos = strstr(pem + pem_count, "\n-----END PUBLIC KEY-----");
  647. if(!end_pos)
  648. return CURLE_BAD_CONTENT_ENCODING;
  649. pem_len = end_pos - pem;
  650. stripped_pem = malloc(pem_len - pem_count + 1);
  651. if(!stripped_pem)
  652. return CURLE_OUT_OF_MEMORY;
  653. /*
  654. * Here we loop through the pem array one character at a time between the
  655. * correct indices, and place each character that is not '\n' or '\r'
  656. * into the stripped_pem array, which should represent the raw base64 string
  657. */
  658. while(pem_count < pem_len) {
  659. if('\n' != pem[pem_count] && '\r' != pem[pem_count])
  660. stripped_pem[stripped_pem_count++] = pem[pem_count];
  661. ++pem_count;
  662. }
  663. /* Place the null terminator in the correct place */
  664. stripped_pem[stripped_pem_count] = '\0';
  665. result = Curl_base64_decode(stripped_pem, der, der_len);
  666. Curl_safefree(stripped_pem);
  667. return result;
  668. }
  669. /*
  670. * Generic pinned public key check.
  671. */
  672. CURLcode Curl_pin_peer_pubkey(struct Curl_easy *data,
  673. const char *pinnedpubkey,
  674. const unsigned char *pubkey, size_t pubkeylen)
  675. {
  676. FILE *fp;
  677. unsigned char *buf = NULL, *pem_ptr = NULL;
  678. long filesize;
  679. size_t size, pem_len;
  680. CURLcode pem_read;
  681. CURLcode result = CURLE_SSL_PINNEDPUBKEYNOTMATCH;
  682. CURLcode encode;
  683. size_t encodedlen, pinkeylen;
  684. char *encoded, *pinkeycopy, *begin_pos, *end_pos;
  685. unsigned char *sha256sumdigest = NULL;
  686. /* if a path wasn't specified, don't pin */
  687. if(!pinnedpubkey)
  688. return CURLE_OK;
  689. if(!pubkey || !pubkeylen)
  690. return result;
  691. /* only do this if pinnedpubkey starts with "sha256//", length 8 */
  692. if(strncmp(pinnedpubkey, "sha256//", 8) == 0) {
  693. if(!Curl_ssl->sha256sum) {
  694. /* without sha256 support, this cannot match */
  695. return result;
  696. }
  697. /* compute sha256sum of public key */
  698. sha256sumdigest = malloc(CURL_SHA256_DIGEST_LENGTH);
  699. if(!sha256sumdigest)
  700. return CURLE_OUT_OF_MEMORY;
  701. Curl_ssl->sha256sum(pubkey, pubkeylen,
  702. sha256sumdigest, CURL_SHA256_DIGEST_LENGTH);
  703. encode = Curl_base64_encode(data, (char *)sha256sumdigest,
  704. CURL_SHA256_DIGEST_LENGTH, &encoded,
  705. &encodedlen);
  706. Curl_safefree(sha256sumdigest);
  707. if(encode)
  708. return encode;
  709. infof(data, "\t public key hash: sha256//%s\n", encoded);
  710. /* it starts with sha256//, copy so we can modify it */
  711. pinkeylen = strlen(pinnedpubkey) + 1;
  712. pinkeycopy = malloc(pinkeylen);
  713. if(!pinkeycopy) {
  714. Curl_safefree(encoded);
  715. return CURLE_OUT_OF_MEMORY;
  716. }
  717. memcpy(pinkeycopy, pinnedpubkey, pinkeylen);
  718. /* point begin_pos to the copy, and start extracting keys */
  719. begin_pos = pinkeycopy;
  720. do {
  721. end_pos = strstr(begin_pos, ";sha256//");
  722. /*
  723. * if there is an end_pos, null terminate,
  724. * otherwise it'll go to the end of the original string
  725. */
  726. if(end_pos)
  727. end_pos[0] = '\0';
  728. /* compare base64 sha256 digests, 8 is the length of "sha256//" */
  729. if(encodedlen == strlen(begin_pos + 8) &&
  730. !memcmp(encoded, begin_pos + 8, encodedlen)) {
  731. result = CURLE_OK;
  732. break;
  733. }
  734. /*
  735. * change back the null-terminator we changed earlier,
  736. * and look for next begin
  737. */
  738. if(end_pos) {
  739. end_pos[0] = ';';
  740. begin_pos = strstr(end_pos, "sha256//");
  741. }
  742. } while(end_pos && begin_pos);
  743. Curl_safefree(encoded);
  744. Curl_safefree(pinkeycopy);
  745. return result;
  746. }
  747. fp = fopen(pinnedpubkey, "rb");
  748. if(!fp)
  749. return result;
  750. do {
  751. /* Determine the file's size */
  752. if(fseek(fp, 0, SEEK_END))
  753. break;
  754. filesize = ftell(fp);
  755. if(fseek(fp, 0, SEEK_SET))
  756. break;
  757. if(filesize < 0 || filesize > MAX_PINNED_PUBKEY_SIZE)
  758. break;
  759. /*
  760. * if the size of our certificate is bigger than the file
  761. * size then it can't match
  762. */
  763. size = curlx_sotouz((curl_off_t) filesize);
  764. if(pubkeylen > size)
  765. break;
  766. /*
  767. * Allocate buffer for the pinned key
  768. * With 1 additional byte for null terminator in case of PEM key
  769. */
  770. buf = malloc(size + 1);
  771. if(!buf)
  772. break;
  773. /* Returns number of elements read, which should be 1 */
  774. if((int) fread(buf, size, 1, fp) != 1)
  775. break;
  776. /* If the sizes are the same, it can't be base64 encoded, must be der */
  777. if(pubkeylen == size) {
  778. if(!memcmp(pubkey, buf, pubkeylen))
  779. result = CURLE_OK;
  780. break;
  781. }
  782. /*
  783. * Otherwise we will assume it's PEM and try to decode it
  784. * after placing null terminator
  785. */
  786. buf[size] = '\0';
  787. pem_read = pubkey_pem_to_der((const char *)buf, &pem_ptr, &pem_len);
  788. /* if it wasn't read successfully, exit */
  789. if(pem_read)
  790. break;
  791. /*
  792. * if the size of our certificate doesn't match the size of
  793. * the decoded file, they can't be the same, otherwise compare
  794. */
  795. if(pubkeylen == pem_len && !memcmp(pubkey, pem_ptr, pubkeylen))
  796. result = CURLE_OK;
  797. } while(0);
  798. Curl_safefree(buf);
  799. Curl_safefree(pem_ptr);
  800. fclose(fp);
  801. return result;
  802. }
  803. #ifndef CURL_DISABLE_CRYPTO_AUTH
  804. CURLcode Curl_ssl_md5sum(unsigned char *tmp, /* input */
  805. size_t tmplen,
  806. unsigned char *md5sum, /* output */
  807. size_t md5len)
  808. {
  809. return Curl_ssl->md5sum(tmp, tmplen, md5sum, md5len);
  810. }
  811. #endif
  812. /*
  813. * Check whether the SSL backend supports the status_request extension.
  814. */
  815. bool Curl_ssl_cert_status_request(void)
  816. {
  817. return Curl_ssl->cert_status_request();
  818. }
  819. /*
  820. * Check whether the SSL backend supports false start.
  821. */
  822. bool Curl_ssl_false_start(void)
  823. {
  824. return Curl_ssl->false_start();
  825. }
  826. /*
  827. * Default implementations for unsupported functions.
  828. */
  829. int Curl_none_init(void)
  830. {
  831. return 1;
  832. }
  833. void Curl_none_cleanup(void)
  834. { }
  835. int Curl_none_shutdown(struct connectdata *conn UNUSED_PARAM,
  836. int sockindex UNUSED_PARAM)
  837. {
  838. (void)conn;
  839. (void)sockindex;
  840. return 0;
  841. }
  842. int Curl_none_check_cxn(struct connectdata *conn UNUSED_PARAM)
  843. {
  844. (void)conn;
  845. return -1;
  846. }
  847. CURLcode Curl_none_random(struct Curl_easy *data UNUSED_PARAM,
  848. unsigned char *entropy UNUSED_PARAM,
  849. size_t length UNUSED_PARAM)
  850. {
  851. (void)data;
  852. (void)entropy;
  853. (void)length;
  854. return CURLE_NOT_BUILT_IN;
  855. }
  856. void Curl_none_close_all(struct Curl_easy *data UNUSED_PARAM)
  857. {
  858. (void)data;
  859. }
  860. void Curl_none_session_free(void *ptr UNUSED_PARAM)
  861. {
  862. (void)ptr;
  863. }
  864. bool Curl_none_data_pending(const struct connectdata *conn UNUSED_PARAM,
  865. int connindex UNUSED_PARAM)
  866. {
  867. (void)conn;
  868. (void)connindex;
  869. return 0;
  870. }
  871. bool Curl_none_cert_status_request(void)
  872. {
  873. return FALSE;
  874. }
  875. CURLcode Curl_none_set_engine(struct Curl_easy *data UNUSED_PARAM,
  876. const char *engine UNUSED_PARAM)
  877. {
  878. (void)data;
  879. (void)engine;
  880. return CURLE_NOT_BUILT_IN;
  881. }
  882. CURLcode Curl_none_set_engine_default(struct Curl_easy *data UNUSED_PARAM)
  883. {
  884. (void)data;
  885. return CURLE_NOT_BUILT_IN;
  886. }
  887. struct curl_slist *Curl_none_engines_list(struct Curl_easy *data UNUSED_PARAM)
  888. {
  889. (void)data;
  890. return (struct curl_slist *)NULL;
  891. }
  892. bool Curl_none_false_start(void)
  893. {
  894. return FALSE;
  895. }
  896. #ifndef CURL_DISABLE_CRYPTO_AUTH
  897. CURLcode Curl_none_md5sum(unsigned char *input, size_t inputlen,
  898. unsigned char *md5sum, size_t md5len UNUSED_PARAM)
  899. {
  900. MD5_context *MD5pw;
  901. (void)md5len;
  902. MD5pw = Curl_MD5_init(Curl_DIGEST_MD5);
  903. if(!MD5pw)
  904. return CURLE_OUT_OF_MEMORY;
  905. Curl_MD5_update(MD5pw, input, curlx_uztoui(inputlen));
  906. Curl_MD5_final(MD5pw, md5sum);
  907. return CURLE_OK;
  908. }
  909. #else
  910. CURLcode Curl_none_md5sum(unsigned char *input UNUSED_PARAM,
  911. size_t inputlen UNUSED_PARAM,
  912. unsigned char *md5sum UNUSED_PARAM,
  913. size_t md5len UNUSED_PARAM)
  914. {
  915. (void)input;
  916. (void)inputlen;
  917. (void)md5sum;
  918. (void)md5len;
  919. return CURLE_NOT_BUILT_IN;
  920. }
  921. #endif
  922. static int Curl_multissl_init(void)
  923. {
  924. if(multissl_init(NULL))
  925. return 1;
  926. return Curl_ssl->init();
  927. }
  928. static CURLcode Curl_multissl_connect(struct connectdata *conn, int sockindex)
  929. {
  930. if(multissl_init(NULL))
  931. return CURLE_FAILED_INIT;
  932. return Curl_ssl->connect(conn, sockindex);
  933. }
  934. static CURLcode Curl_multissl_connect_nonblocking(struct connectdata *conn,
  935. int sockindex, bool *done)
  936. {
  937. if(multissl_init(NULL))
  938. return CURLE_FAILED_INIT;
  939. return Curl_ssl->connect_nonblocking(conn, sockindex, done);
  940. }
  941. static void *Curl_multissl_get_internals(struct ssl_connect_data *connssl,
  942. CURLINFO info)
  943. {
  944. if(multissl_init(NULL))
  945. return NULL;
  946. return Curl_ssl->get_internals(connssl, info);
  947. }
  948. static void Curl_multissl_close(struct connectdata *conn, int sockindex)
  949. {
  950. if(multissl_init(NULL))
  951. return;
  952. Curl_ssl->close_one(conn, sockindex);
  953. }
  954. static const struct Curl_ssl Curl_ssl_multi = {
  955. { CURLSSLBACKEND_NONE, "multi" }, /* info */
  956. 0, /* have_ca_path */
  957. 0, /* have_certinfo */
  958. 0, /* have_pinnedpubkey */
  959. 0, /* have_ssl_ctx */
  960. 0, /* support_https_proxy */
  961. (size_t)-1, /* something insanely large to be on the safe side */
  962. Curl_multissl_init, /* init */
  963. Curl_none_cleanup, /* cleanup */
  964. Curl_multissl_version, /* version */
  965. Curl_none_check_cxn, /* check_cxn */
  966. Curl_none_shutdown, /* shutdown */
  967. Curl_none_data_pending, /* data_pending */
  968. Curl_none_random, /* random */
  969. Curl_none_cert_status_request, /* cert_status_request */
  970. Curl_multissl_connect, /* connect */
  971. Curl_multissl_connect_nonblocking, /* connect_nonblocking */
  972. Curl_multissl_get_internals, /* get_internals */
  973. Curl_multissl_close, /* close_one */
  974. Curl_none_close_all, /* close_all */
  975. Curl_none_session_free, /* session_free */
  976. Curl_none_set_engine, /* set_engine */
  977. Curl_none_set_engine_default, /* set_engine_default */
  978. Curl_none_engines_list, /* engines_list */
  979. Curl_none_false_start, /* false_start */
  980. Curl_none_md5sum, /* md5sum */
  981. NULL /* sha256sum */
  982. };
  983. const struct Curl_ssl *Curl_ssl =
  984. #if defined(CURL_WITH_MULTI_SSL)
  985. &Curl_ssl_multi;
  986. #elif defined(USE_AXTLS)
  987. &Curl_ssl_axtls;
  988. #elif defined(USE_CYASSL)
  989. &Curl_ssl_cyassl;
  990. #elif defined(USE_DARWINSSL)
  991. &Curl_ssl_darwinssl;
  992. #elif defined(USE_GNUTLS)
  993. &Curl_ssl_gnutls;
  994. #elif defined(USE_GSKIT)
  995. &Curl_ssl_gskit;
  996. #elif defined(USE_MBEDTLS)
  997. &Curl_ssl_mbedtls;
  998. #elif defined(USE_NSS)
  999. &Curl_ssl_nss;
  1000. #elif defined(USE_OPENSSL)
  1001. &Curl_ssl_openssl;
  1002. #elif defined(USE_POLARSSL)
  1003. &Curl_ssl_polarssl;
  1004. #elif defined(USE_SCHANNEL)
  1005. &Curl_ssl_schannel;
  1006. #else
  1007. #error "Missing struct Curl_ssl for selected SSL backend"
  1008. #endif
  1009. static const struct Curl_ssl *available_backends[] = {
  1010. #if defined(USE_AXTLS)
  1011. &Curl_ssl_axtls,
  1012. #endif
  1013. #if defined(USE_CYASSL)
  1014. &Curl_ssl_cyassl,
  1015. #endif
  1016. #if defined(USE_DARWINSSL)
  1017. &Curl_ssl_darwinssl,
  1018. #endif
  1019. #if defined(USE_GNUTLS)
  1020. &Curl_ssl_gnutls,
  1021. #endif
  1022. #if defined(USE_GSKIT)
  1023. &Curl_ssl_gskit,
  1024. #endif
  1025. #if defined(USE_MBEDTLS)
  1026. &Curl_ssl_mbedtls,
  1027. #endif
  1028. #if defined(USE_NSS)
  1029. &Curl_ssl_nss,
  1030. #endif
  1031. #if defined(USE_OPENSSL)
  1032. &Curl_ssl_openssl,
  1033. #endif
  1034. #if defined(USE_POLARSSL)
  1035. &Curl_ssl_polarssl,
  1036. #endif
  1037. #if defined(USE_SCHANNEL)
  1038. &Curl_ssl_schannel,
  1039. #endif
  1040. NULL
  1041. };
  1042. static size_t Curl_multissl_version(char *buffer, size_t size)
  1043. {
  1044. static const struct Curl_ssl *selected;
  1045. static char backends[200];
  1046. static size_t total;
  1047. const struct Curl_ssl *current;
  1048. current = Curl_ssl == &Curl_ssl_multi ? available_backends[0] : Curl_ssl;
  1049. if(current != selected) {
  1050. char *p = backends;
  1051. int i;
  1052. selected = current;
  1053. for(i = 0; available_backends[i]; i++) {
  1054. if(i)
  1055. *(p++) = ' ';
  1056. if(selected != available_backends[i])
  1057. *(p++) = '(';
  1058. p += available_backends[i]->version(p, backends + sizeof(backends) - p);
  1059. if(selected != available_backends[i])
  1060. *(p++) = ')';
  1061. }
  1062. *p = '\0';
  1063. total = p - backends;
  1064. }
  1065. if(size < total)
  1066. memcpy(buffer, backends, total + 1);
  1067. else {
  1068. memcpy(buffer, backends, size - 1);
  1069. buffer[size - 1] = '\0';
  1070. }
  1071. return total;
  1072. }
  1073. static int multissl_init(const struct Curl_ssl *backend)
  1074. {
  1075. const char *env;
  1076. char *env_tmp;
  1077. int i;
  1078. if(Curl_ssl != &Curl_ssl_multi)
  1079. return 1;
  1080. if(backend) {
  1081. Curl_ssl = backend;
  1082. return 0;
  1083. }
  1084. if(!available_backends[0])
  1085. return 1;
  1086. env = env_tmp = curl_getenv("CURL_SSL_BACKEND");
  1087. #ifdef CURL_DEFAULT_SSL_BACKEND
  1088. if(!env)
  1089. env = CURL_DEFAULT_SSL_BACKEND;
  1090. #endif
  1091. if(env) {
  1092. for(i = 0; available_backends[i]; i++) {
  1093. if(strcasecompare(env, available_backends[i]->info.name)) {
  1094. Curl_ssl = available_backends[i];
  1095. curl_free(env_tmp);
  1096. return 0;
  1097. }
  1098. }
  1099. }
  1100. /* Fall back to first available backend */
  1101. Curl_ssl = available_backends[0];
  1102. curl_free(env_tmp);
  1103. return 0;
  1104. }
  1105. CURLsslset curl_global_sslset(curl_sslbackend id, const char *name,
  1106. const curl_ssl_backend ***avail)
  1107. {
  1108. int i;
  1109. if(Curl_ssl != &Curl_ssl_multi)
  1110. return id == Curl_ssl->info.id ? CURLSSLSET_OK : CURLSSLSET_TOO_LATE;
  1111. for(i = 0; available_backends[i]; i++) {
  1112. if(available_backends[i]->info.id == id ||
  1113. (name && strcasecompare(available_backends[i]->info.name, name))) {
  1114. multissl_init(available_backends[i]);
  1115. return CURLSSLSET_OK;
  1116. }
  1117. }
  1118. if(avail)
  1119. *avail = (const curl_ssl_backend **)&available_backends;
  1120. return CURLSSLSET_UNKNOWN_BACKEND;
  1121. }
  1122. #else /* USE_SSL */
  1123. CURLsslset curl_global_sslset(curl_sslbackend id, const char *name,
  1124. const curl_ssl_backend ***avail)
  1125. {
  1126. (void)id;
  1127. (void)name;
  1128. (void)avail;
  1129. return CURLSSLSET_NO_BACKENDS;
  1130. }
  1131. #endif /* !USE_SSL */