Files
wget2/libwget/tls_session.c
Tim Rühsen bfcd65c12b Use typedefs for function pointer arguments
* include/wget/wget.h: Add typedefs
* libwget/cookie.c: Use typedefs
* libwget/css.c: Likewise
* libwget/css_url.c: Likewise
* libwget/decompressor.c: Likewise
* libwget/hashmap.c: Likewise
* libwget/hsts.c: Likewise
* libwget/http.c: Likewise
* libwget/init.c: Likewise
* libwget/io.c: Likewise
* libwget/list.c: Likewise
* libwget/logger.c: Likewise
* libwget/metalink.c: Likewise
* libwget/net.c: Likewise
* libwget/netrc.c: Likewise
* libwget/ocsp.c: Likewise
* libwget/private.h: Likewise
* libwget/robots.c: Likewise
* libwget/stringmap.c: Likewise
* libwget/tls_session.c: Likewise
* libwget/vector.c: Likewise
* libwget/xml.c: Likewise
* src/blacklist.c: Likewise
* src/host.c: Likewise
* src/options.c: Likewise
* src/wget.c: Likewise
* tests/stringmap_perf.c: Likewise
* tests/test.c: Likewise
2017-01-23 14:43:17 +01:00

399 lines
10 KiB
C

/*
* Copyright(c) 2016 Free Software Foundation, Inc.
*
* This file is part of libwget.
*
* Libwget is free software: you can redistribute it and/or modify
* it under the terms of the GNU Lesser General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* Libwget is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with libwget. If not, see <http://www.gnu.org/licenses/>.
*
*
* TLS session data cache for TLS resumption
*
* Changelog
* 21.07.2016 Tim Ruehsen created
*
*/
#if HAVE_CONFIG_H
# include <config.h>
#endif
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <ctype.h>
#include <time.h>
#include <errno.h>
#include <sys/stat.h>
#include <sys/file.h>
#include <wget.h>
#include "private.h"
struct _wget_tls_session_db_st {
wget_hashmap_t *
entries;
wget_thread_mutex_t
mutex;
time_t
load_time;
unsigned char
changed : 1; // whether or not the db has been changed / needs saving
};
struct _wget_tls_session_st {
const char *
host;
time_t
maxage; // expiry time
time_t
mtime; // creation time
size_t
data_size;
const char *
data; // session resumption data
// unsigned char
// include_subdomains : 1; // whether or not subdomains are included
};
static unsigned int G_GNUC_WGET_PURE _hash_tls_session(const wget_tls_session_t *tls_session)
{
// unsigned int hash = tls_session->data_size;
unsigned int hash = 0;
const unsigned char *p;
for (p = (unsigned char *)tls_session->host; *p; p++)
hash = hash * 101 + *p;
return hash;
}
static int G_GNUC_WGET_NONNULL_ALL G_GNUC_WGET_PURE _compare_tls_session(const wget_tls_session_t *s1, const wget_tls_session_t *s2)
{
int n;
if ((n = strcmp(s1->host, s2->host)))
return n;
// if (s1->data_size < s2->data_size)
// return -1;
// if (s1->data_size > s2->data_size)
// return 1;
// return memcmp(s1->data, s2->data, s1->data_size);
return 0;
}
wget_tls_session_t *wget_tls_session_init(wget_tls_session_t *tls_session)
{
if (!tls_session)
tls_session = xmalloc(sizeof(wget_tls_session_t));
memset(tls_session, 0, sizeof(*tls_session));
tls_session->mtime = time(NULL);
return tls_session;
}
void wget_tls_session_deinit(wget_tls_session_t *tls_session)
{
if (tls_session) {
xfree(tls_session->host);
xfree(tls_session->data);
}
}
void wget_tls_session_free(wget_tls_session_t *tls_session)
{
if (tls_session) {
wget_tls_session_deinit(tls_session);
xfree(tls_session);
}
}
wget_tls_session_t *wget_tls_session_new(const char *host, time_t maxage, const void *data, size_t data_size)
{
wget_tls_session_t *tls_session = wget_tls_session_init(NULL);
tls_session->host = wget_strdup(host);
tls_session->maxage = maxage;
tls_session->data = wget_memdup(data, data_size);
tls_session->data_size = data_size;
return tls_session;
}
int wget_tls_session_get(const wget_tls_session_db_t *tls_session_db, const char *host, void **data, size_t *size)
{
if (tls_session_db) {
wget_tls_session_t tls_session, *tls_sessionp;
time_t now = time(NULL);
tls_session.host = host;
if ((tls_sessionp = wget_hashmap_get(tls_session_db->entries, &tls_session)) && tls_sessionp->maxage >= now) {
if (data)
*data = wget_memdup(tls_sessionp->data, tls_sessionp->data_size);
if (size)
*size = tls_sessionp->data_size;
return 0;
}
}
return 1;
}
wget_tls_session_db_t *wget_tls_session_db_init(wget_tls_session_db_t *tls_session_db)
{
if (!tls_session_db)
tls_session_db = xmalloc(sizeof(wget_tls_session_db_t));
memset(tls_session_db, 0, sizeof(*tls_session_db));
tls_session_db->entries = wget_hashmap_create(16, -2, (wget_hashmap_hash_t)_hash_tls_session, (wget_hashmap_compare_t)_compare_tls_session);
wget_hashmap_set_key_destructor(tls_session_db->entries, (wget_hashmap_key_destructor_t)wget_tls_session_free);
wget_hashmap_set_value_destructor(tls_session_db->entries, (wget_hashmap_value_destructor_t)wget_tls_session_free);
wget_thread_mutex_init(&tls_session_db->mutex);
return tls_session_db;
}
void wget_tls_session_db_deinit(wget_tls_session_db_t *tls_session_db)
{
if (tls_session_db) {
wget_thread_mutex_lock(&tls_session_db->mutex);
wget_hashmap_free(&tls_session_db->entries);
wget_thread_mutex_unlock(&tls_session_db->mutex);
}
}
void wget_tls_session_db_free(wget_tls_session_db_t **tls_session_db)
{
if (tls_session_db) {
wget_tls_session_db_deinit(*tls_session_db);
xfree(*tls_session_db);
}
}
void wget_tls_session_db_add(wget_tls_session_db_t *tls_session_db, wget_tls_session_t *tls_session)
{
wget_thread_mutex_lock(&tls_session_db->mutex);
if (tls_session->maxage == 0) {
if (wget_hashmap_remove(tls_session_db->entries, tls_session)) {
tls_session_db->changed = 1;
debug_printf("removed TLS session data for %s\n", tls_session->host);
}
wget_tls_session_free(tls_session);
tls_session = NULL;
} else {
wget_tls_session_t *old = wget_hashmap_get(tls_session_db->entries, tls_session);
if (old) {
debug_printf("found TLS session data for %s\n", old->host);
if (wget_hashmap_remove(tls_session_db->entries, old))
debug_printf("removed TLS session data for %s\n", tls_session->host);
}
debug_printf("add TLS session data for %s (maxage=%ld, size=%zu)\n", tls_session->host, tls_session->maxage, tls_session->data_size);
wget_hashmap_put_noalloc(tls_session_db->entries, tls_session, tls_session);
tls_session_db->changed = 1;
/*
if (old) {
if (old->mtime < tls_session->mtime) {
old->mtime = tls_session->mtime;
old->maxage = tls_session->maxage;
debug_printf("update TLS session data for %s (maxage=%ld)\n", old->host, old->maxage);
}
wget_tls_session_free(tls_session);
tls_session = NULL;
} else {
// key and value are the same to make wget_hashmap_get() return old 'tls_session'
debug_printf("add TLS session data for %s (maxage=%ld, size=%zu)\n", tls_session->host, tls_session->maxage, tls_session->data_size);
wget_hashmap_put_noalloc(tls_session_db->entries, tls_session, tls_session);
// no need to free anything here
}
*/
}
wget_thread_mutex_unlock(&tls_session_db->mutex);
}
static int _tls_session_db_load(wget_tls_session_db_t *tls_session_db, FILE *fp)
{
wget_tls_session_t tls_session;
struct stat st;
char *buf = NULL, *linep, *p;
size_t bufsize = 0;
ssize_t buflen;
time_t now = time(NULL);
int ok;
// if the database file hasn't changed since the last read
// there's no need to reload
if (fstat(fileno(fp), &st) == 0) {
if (st.st_mtime != tls_session_db->load_time)
tls_session_db->load_time = st.st_mtime;
else
return 0;
}
while ((buflen = wget_getline(&buf, &bufsize, fp)) >= 0) {
linep = buf;
while (isspace(*linep)) linep++; // ignore leading whitespace
if (!*linep) continue; // skip empty lines
if (*linep == '#')
continue; // skip comments
// strip off \r\n
while (buflen > 0 && (buf[buflen] == '\n' || buf[buflen] == '\r'))
buf[--buflen] = 0;
wget_tls_session_init(&tls_session);
ok = 0;
// parse host
if (*linep) {
for (p = linep; *linep && !isspace(*linep); )
linep++;
tls_session.host = wget_strmemdup(p, linep - p);
}
// parse max age
if (*linep) {
for (p = ++linep; *linep && !isspace(*linep); )
linep++;
tls_session.maxage = atol(p);
if (tls_session.maxage < now) {
// drop expired entry
wget_tls_session_deinit(&tls_session);
continue;
}
}
// parse mtime (age of this entry)
if (*linep) {
for (p = ++linep; *linep && !isspace(*linep); )
linep++;
tls_session.mtime = atol(p);
}
// parse session data
if (*linep) {
for (p = ++linep; *linep && !isspace(*linep); )
linep++;
size_t len = linep - p;
char *data = xmalloc(wget_base64_get_decoded_length(len));
tls_session.data_size = wget_base64_decode(data, p, len);
tls_session.data = data;
ok = 1;
}
if (ok) {
wget_tls_session_db_add(tls_session_db, wget_memdup(&tls_session, sizeof(tls_session)));
} else {
wget_tls_session_deinit(&tls_session);
error_printf(_("Failed to parse HSTS line: '%s'\n"), buf);
}
}
xfree(buf);
if (ferror(fp)) {
tls_session_db->load_time = 0; // reload on next call to this function
return -1;
}
return 0;
}
// Load the TLS session cache from a flat file
// Protected by flock()
int wget_tls_session_db_load(wget_tls_session_db_t *tls_session_db, const char *fname)
{
if (!tls_session_db || !fname || !*fname)
return 0;
if (wget_update_file(fname, (wget_update_load_t)_tls_session_db_load, NULL, tls_session_db)) {
error_printf(_("Failed to read TLS session data\n"));
return -1;
} else {
debug_printf(_("Fetched TLS session data from '%s'\n"), fname);
return 0;
}
}
static int G_GNUC_WGET_NONNULL_ALL _tls_session_save(FILE *fp, const wget_tls_session_t *tls_session)
{
char session_b64[((tls_session->data_size + 2) / 3) * 4 + 1];
wget_base64_encode(session_b64, (const char *) tls_session->data, tls_session->data_size);
fprintf(fp, "%s %ld %ld %s\n", tls_session->host, tls_session->maxage, tls_session->mtime, session_b64);
return 0;
}
static int _tls_session_db_save(void *tls_session_db, FILE *fp)
{
wget_hashmap_t *entries = ((wget_tls_session_db_t *)tls_session_db)->entries;
if (wget_hashmap_size(entries) > 0) {
fputs("#TLSSession 1.0 file\n", fp);
fputs("#Generated by Wget2 " PACKAGE_VERSION ". Edit at your own risk.\n", fp);
fputs("#<hostname> <time_t maxage> <time_t mtime> <session data>\n\n", fp);
wget_hashmap_browse(entries, (wget_hashmap_browse_t)_tls_session_save, fp);
if (ferror(fp))
return -1;
}
return 0;
}
// Save the TLS session cache to a flat file
// Protected by flock()
int wget_tls_session_db_save(wget_tls_session_db_t *tls_session_db, const char *fname)
{
int size;
if (!tls_session_db || !fname || !*fname)
return -1;
if (wget_update_file(fname, (wget_update_load_t)_tls_session_db_load, _tls_session_db_save, tls_session_db)) {
error_printf(_("Failed to write TLS session file '%s'\n"), fname);
return -1;
}
if ((size = wget_hashmap_size(tls_session_db->entries)))
debug_printf(_("Saved %d TLS session entr%s into '%s'\n"), size, size != 1 ? "ies" : "y", fname);
else
debug_printf(_("No TLS session entries to save. Table is empty.\n"));
tls_session_db->changed = 0;
return 0;
}
int wget_tls_session_db_changed(wget_tls_session_db_t *tls_session_db)
{
return tls_session_db ? tls_session_db->changed : 0;
}