1 | /***************************************************************************
|
---|
2 | * _ _ ____ _
|
---|
3 | * Project ___| | | | _ \| |
|
---|
4 | * / __| | | | |_) | |
|
---|
5 | * | (__| |_| | _ <| |___
|
---|
6 | * \___|\___/|_| \_\_____|
|
---|
7 | *
|
---|
8 | * Copyright (C) 1998 - 2020, Daniel Stenberg, <[email protected]>, et al.
|
---|
9 | *
|
---|
10 | * This software is licensed as described in the file COPYING, which
|
---|
11 | * you should have received as part of this distribution. The terms
|
---|
12 | * are also available at https://curl.se/docs/copyright.html.
|
---|
13 | *
|
---|
14 | * You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
---|
15 | * copies of the Software, and permit persons to whom the Software is
|
---|
16 | * furnished to do so, under the terms of the COPYING file.
|
---|
17 | *
|
---|
18 | * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
---|
19 | * KIND, either express or implied.
|
---|
20 | *
|
---|
21 | ***************************************************************************/
|
---|
22 | #include "curl_setup.h"
|
---|
23 |
|
---|
24 | #include "keylog.h"
|
---|
25 |
|
---|
26 | /* The last #include files should be: */
|
---|
27 | #include "curl_memory.h"
|
---|
28 | #include "memdebug.h"
|
---|
29 |
|
---|
30 | #define KEYLOG_LABEL_MAXLEN (sizeof("CLIENT_HANDSHAKE_TRAFFIC_SECRET") - 1)
|
---|
31 |
|
---|
32 | #define CLIENT_RANDOM_SIZE 32
|
---|
33 |
|
---|
34 | /*
|
---|
35 | * The master secret in TLS 1.2 and before is always 48 bytes. In TLS 1.3, the
|
---|
36 | * secret size depends on the cipher suite's hash function which is 32 bytes
|
---|
37 | * for SHA-256 and 48 bytes for SHA-384.
|
---|
38 | */
|
---|
39 | #define SECRET_MAXLEN 48
|
---|
40 |
|
---|
41 |
|
---|
42 | /* The fp for the open SSLKEYLOGFILE, or NULL if not open */
|
---|
43 | static FILE *keylog_file_fp;
|
---|
44 |
|
---|
45 | void
|
---|
46 | Curl_tls_keylog_open(void)
|
---|
47 | {
|
---|
48 | char *keylog_file_name;
|
---|
49 |
|
---|
50 | if(!keylog_file_fp) {
|
---|
51 | keylog_file_name = curl_getenv("SSLKEYLOGFILE");
|
---|
52 | if(keylog_file_name) {
|
---|
53 | keylog_file_fp = fopen(keylog_file_name, FOPEN_APPENDTEXT);
|
---|
54 | if(keylog_file_fp) {
|
---|
55 | #ifdef WIN32
|
---|
56 | if(setvbuf(keylog_file_fp, NULL, _IONBF, 0))
|
---|
57 | #else
|
---|
58 | if(setvbuf(keylog_file_fp, NULL, _IOLBF, 4096))
|
---|
59 | #endif
|
---|
60 | {
|
---|
61 | fclose(keylog_file_fp);
|
---|
62 | keylog_file_fp = NULL;
|
---|
63 | }
|
---|
64 | }
|
---|
65 | Curl_safefree(keylog_file_name);
|
---|
66 | }
|
---|
67 | }
|
---|
68 | }
|
---|
69 |
|
---|
70 | void
|
---|
71 | Curl_tls_keylog_close(void)
|
---|
72 | {
|
---|
73 | if(keylog_file_fp) {
|
---|
74 | fclose(keylog_file_fp);
|
---|
75 | keylog_file_fp = NULL;
|
---|
76 | }
|
---|
77 | }
|
---|
78 |
|
---|
79 | bool
|
---|
80 | Curl_tls_keylog_enabled(void)
|
---|
81 | {
|
---|
82 | return keylog_file_fp != NULL;
|
---|
83 | }
|
---|
84 |
|
---|
85 | bool
|
---|
86 | Curl_tls_keylog_write_line(const char *line)
|
---|
87 | {
|
---|
88 | /* The current maximum valid keylog line length LF and NUL is 195. */
|
---|
89 | size_t linelen;
|
---|
90 | char buf[256];
|
---|
91 |
|
---|
92 | if(!keylog_file_fp || !line) {
|
---|
93 | return false;
|
---|
94 | }
|
---|
95 |
|
---|
96 | linelen = strlen(line);
|
---|
97 | if(linelen == 0 || linelen > sizeof(buf) - 2) {
|
---|
98 | /* Empty line or too big to fit in a LF and NUL. */
|
---|
99 | return false;
|
---|
100 | }
|
---|
101 |
|
---|
102 | memcpy(buf, line, linelen);
|
---|
103 | if(line[linelen - 1] != '\n') {
|
---|
104 | buf[linelen++] = '\n';
|
---|
105 | }
|
---|
106 | buf[linelen] = '\0';
|
---|
107 |
|
---|
108 | /* Using fputs here instead of fprintf since libcurl's fprintf replacement
|
---|
109 | may not be thread-safe. */
|
---|
110 | fputs(buf, keylog_file_fp);
|
---|
111 | return true;
|
---|
112 | }
|
---|
113 |
|
---|
114 | bool
|
---|
115 | Curl_tls_keylog_write(const char *label,
|
---|
116 | const unsigned char client_random[CLIENT_RANDOM_SIZE],
|
---|
117 | const unsigned char *secret, size_t secretlen)
|
---|
118 | {
|
---|
119 | const char *hex = "0123456789ABCDEF";
|
---|
120 | size_t pos, i;
|
---|
121 | char line[KEYLOG_LABEL_MAXLEN + 1 + 2 * CLIENT_RANDOM_SIZE + 1 +
|
---|
122 | 2 * SECRET_MAXLEN + 1 + 1];
|
---|
123 |
|
---|
124 | if(!keylog_file_fp) {
|
---|
125 | return false;
|
---|
126 | }
|
---|
127 |
|
---|
128 | pos = strlen(label);
|
---|
129 | if(pos > KEYLOG_LABEL_MAXLEN || !secretlen || secretlen > SECRET_MAXLEN) {
|
---|
130 | /* Should never happen - sanity check anyway. */
|
---|
131 | return false;
|
---|
132 | }
|
---|
133 |
|
---|
134 | memcpy(line, label, pos);
|
---|
135 | line[pos++] = ' ';
|
---|
136 |
|
---|
137 | /* Client Random */
|
---|
138 | for(i = 0; i < CLIENT_RANDOM_SIZE; i++) {
|
---|
139 | line[pos++] = hex[client_random[i] >> 4];
|
---|
140 | line[pos++] = hex[client_random[i] & 0xF];
|
---|
141 | }
|
---|
142 | line[pos++] = ' ';
|
---|
143 |
|
---|
144 | /* Secret */
|
---|
145 | for(i = 0; i < secretlen; i++) {
|
---|
146 | line[pos++] = hex[secret[i] >> 4];
|
---|
147 | line[pos++] = hex[secret[i] & 0xF];
|
---|
148 | }
|
---|
149 | line[pos++] = '\n';
|
---|
150 | line[pos] = '\0';
|
---|
151 |
|
---|
152 | /* Using fputs here instead of fprintf since libcurl's fprintf replacement
|
---|
153 | may not be thread-safe. */
|
---|
154 | fputs(line, keylog_file_fp);
|
---|
155 | return true;
|
---|
156 | }
|
---|