Builtin macros for OpenSSL options
[exim.git] / src / src / tls-openssl.c
CommitLineData
059ec3d9
PH
1/*************************************************
2* Exim - an Internet mail transport agent *
3*************************************************/
4
f9ba5e22 5/* Copyright (c) University of Cambridge 1995 - 2018 */
059ec3d9
PH
6/* See the file NOTICE for conditions of use and distribution. */
7
f5d78688
JH
8/* Portions Copyright (c) The OpenSSL Project 1999 */
9
059ec3d9
PH
10/* This module provides the TLS (aka SSL) support for Exim using the OpenSSL
11library. It is #included into the tls.c file when that library is used. The
12code herein is based on a patch that was originally contributed by Steve
13Haslam. It was adapted from stunnel, a GPL program by Michal Trojnara.
14
15No cryptographic code is included in Exim. All this module does is to call
16functions from the OpenSSL library. */
17
18
19/* Heading stuff */
20
21#include <openssl/lhash.h>
22#include <openssl/ssl.h>
23#include <openssl/err.h>
24#include <openssl/rand.h>
10ca4f1c
JH
25#ifndef OPENSSL_NO_ECDH
26# include <openssl/ec.h>
27#endif
f2de3a33 28#ifndef DISABLE_OCSP
e51c7be2 29# include <openssl/ocsp.h>
3f7eeb86 30#endif
c0635b6d 31#ifdef SUPPORT_DANE
05e796ad 32# include "danessl.h"
85098ee7
JH
33#endif
34
3f7eeb86 35
f2de3a33
JH
36#ifndef DISABLE_OCSP
37# define EXIM_OCSP_SKEW_SECONDS (300L)
38# define EXIM_OCSP_MAX_AGE (-1L)
3f7eeb86 39#endif
059ec3d9 40
3bcbbbe2 41#if OPENSSL_VERSION_NUMBER >= 0x0090806fL && !defined(OPENSSL_NO_TLSEXT)
e51c7be2 42# define EXIM_HAVE_OPENSSL_TLSEXT
3bcbbbe2 43#endif
c8dfb21d
JH
44#if OPENSSL_VERSION_NUMBER >= 0x00908000L
45# define EXIM_HAVE_RSA_GENKEY_EX
46#endif
47#if OPENSSL_VERSION_NUMBER >= 0x10100000L
48# define EXIM_HAVE_OCSP_RESP_COUNT
49#else
50# define EXIM_HAVE_EPHEM_RSA_KEX
51# define EXIM_HAVE_RAND_PSEUDO
52#endif
53#if (OPENSSL_VERSION_NUMBER >= 0x0090800fL) && !defined(OPENSSL_NO_SHA256)
8442641e 54# define EXIM_HAVE_SHA256
c8dfb21d 55#endif
34e3241d
PP
56
57/*
58 * X509_check_host provides sane certificate hostname checking, but was added
59 * to OpenSSL late, after other projects forked off the code-base. So in
60 * addition to guarding against the base version number, beware that LibreSSL
61 * does not (at this time) support this function.
62 *
63 * If LibreSSL gains a different API, perhaps via libtls, then we'll probably
64 * opt to disentangle and ask a LibreSSL user to provide glue for a third
65 * crypto provider for libtls instead of continuing to tie the OpenSSL glue
66 * into even twistier knots. If LibreSSL gains the same API, we can just
67 * change this guard and punt the issue for a while longer.
68 */
69#ifndef LIBRESSL_VERSION_NUMBER
70# if OPENSSL_VERSION_NUMBER >= 0x010100000L
71# define EXIM_HAVE_OPENSSL_CHECKHOST
8420742d 72# define EXIM_HAVE_OPENSSL_DH_BITS
7a8b9519 73# define EXIM_HAVE_OPENSSL_TLS_METHOD
34e3241d
PP
74# endif
75# if OPENSSL_VERSION_NUMBER >= 0x010000000L \
2dfb468b 76 && (OPENSSL_VERSION_NUMBER & 0x0000ff000L) >= 0x000002000L
34e3241d
PP
77# define EXIM_HAVE_OPENSSL_CHECKHOST
78# endif
11aa88b0 79#endif
10ca4f1c 80
11aa88b0
RA
81#if !defined(LIBRESSL_VERSION_NUMBER) \
82 || LIBRESSL_VERSION_NUMBER >= 0x20010000L
10ca4f1c
JH
83# if !defined(OPENSSL_NO_ECDH)
84# if OPENSSL_VERSION_NUMBER >= 0x0090800fL
8442641e 85# define EXIM_HAVE_ECDH
10ca4f1c
JH
86# endif
87# if OPENSSL_VERSION_NUMBER >= 0x10002000L
10ca4f1c
JH
88# define EXIM_HAVE_OPENSSL_EC_NIST2NID
89# endif
90# endif
2dfb468b 91#endif
3bcbbbe2 92
67791ce4
JH
93#if !defined(EXIM_HAVE_OPENSSL_TLSEXT) && !defined(DISABLE_OCSP)
94# warning "OpenSSL library version too old; define DISABLE_OCSP in Makefile"
95# define DISABLE_OCSP
96#endif
97
a6510420
JH
98#ifdef EXIM_HAVE_OPENSSL_CHECKHOST
99# include <openssl/x509v3.h>
100#endif
101
8442641e
JH
102/*************************************************
103* OpenSSL option parse *
104*************************************************/
105
106typedef struct exim_openssl_option {
107 uschar *name;
108 long value;
109} exim_openssl_option;
110/* We could use a macro to expand, but we need the ifdef and not all the
111options document which version they were introduced in. Policylet: include
112all options unless explicitly for DTLS, let the administrator choose which
113to apply.
114
115This list is current as of:
116 ==> 1.0.1b <==
117Plus SSL_OP_SAFARI_ECDHE_ECDSA_BUG from 2013-June patch/discussion on openssl-dev
118Plus SSL_OP_NO_TLSv1_3 for 1.1.2-dev
119*/
120static exim_openssl_option exim_openssl_options[] = {
121/* KEEP SORTED ALPHABETICALLY! */
122#ifdef SSL_OP_ALL
123 { US"all", SSL_OP_ALL },
124#endif
125#ifdef SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION
126 { US"allow_unsafe_legacy_renegotiation", SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION },
127#endif
128#ifdef SSL_OP_CIPHER_SERVER_PREFERENCE
129 { US"cipher_server_preference", SSL_OP_CIPHER_SERVER_PREFERENCE },
130#endif
131#ifdef SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS
132 { US"dont_insert_empty_fragments", SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS },
133#endif
134#ifdef SSL_OP_EPHEMERAL_RSA
135 { US"ephemeral_rsa", SSL_OP_EPHEMERAL_RSA },
136#endif
137#ifdef SSL_OP_LEGACY_SERVER_CONNECT
138 { US"legacy_server_connect", SSL_OP_LEGACY_SERVER_CONNECT },
139#endif
140#ifdef SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER
141 { US"microsoft_big_sslv3_buffer", SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER },
142#endif
143#ifdef SSL_OP_MICROSOFT_SESS_ID_BUG
144 { US"microsoft_sess_id_bug", SSL_OP_MICROSOFT_SESS_ID_BUG },
145#endif
146#ifdef SSL_OP_MSIE_SSLV2_RSA_PADDING
147 { US"msie_sslv2_rsa_padding", SSL_OP_MSIE_SSLV2_RSA_PADDING },
148#endif
149#ifdef SSL_OP_NETSCAPE_CHALLENGE_BUG
150 { US"netscape_challenge_bug", SSL_OP_NETSCAPE_CHALLENGE_BUG },
151#endif
152#ifdef SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
153 { US"netscape_reuse_cipher_change_bug", SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG },
154#endif
155#ifdef SSL_OP_NO_COMPRESSION
156 { US"no_compression", SSL_OP_NO_COMPRESSION },
157#endif
158#ifdef SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION
159 { US"no_session_resumption_on_renegotiation", SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION },
160#endif
161#ifdef SSL_OP_NO_SSLv2
162 { US"no_sslv2", SSL_OP_NO_SSLv2 },
163#endif
164#ifdef SSL_OP_NO_SSLv3
165 { US"no_sslv3", SSL_OP_NO_SSLv3 },
166#endif
167#ifdef SSL_OP_NO_TICKET
168 { US"no_ticket", SSL_OP_NO_TICKET },
169#endif
170#ifdef SSL_OP_NO_TLSv1
171 { US"no_tlsv1", SSL_OP_NO_TLSv1 },
172#endif
173#ifdef SSL_OP_NO_TLSv1_1
174#if SSL_OP_NO_TLSv1_1 == 0x00000400L
175 /* Error in chosen value in 1.0.1a; see first item in CHANGES for 1.0.1b */
176#warning OpenSSL 1.0.1a uses a bad value for SSL_OP_NO_TLSv1_1, ignoring
177#else
178 { US"no_tlsv1_1", SSL_OP_NO_TLSv1_1 },
179#endif
180#endif
181#ifdef SSL_OP_NO_TLSv1_2
182 { US"no_tlsv1_2", SSL_OP_NO_TLSv1_2 },
183#endif
184#ifdef SSL_OP_NO_TLSv1_3
185 { US"no_tlsv1_3", SSL_OP_NO_TLSv1_3 },
186#endif
187#ifdef SSL_OP_SAFARI_ECDHE_ECDSA_BUG
188 { US"safari_ecdhe_ecdsa_bug", SSL_OP_SAFARI_ECDHE_ECDSA_BUG },
189#endif
190#ifdef SSL_OP_SINGLE_DH_USE
191 { US"single_dh_use", SSL_OP_SINGLE_DH_USE },
192#endif
193#ifdef SSL_OP_SINGLE_ECDH_USE
194 { US"single_ecdh_use", SSL_OP_SINGLE_ECDH_USE },
195#endif
196#ifdef SSL_OP_SSLEAY_080_CLIENT_DH_BUG
197 { US"ssleay_080_client_dh_bug", SSL_OP_SSLEAY_080_CLIENT_DH_BUG },
198#endif
199#ifdef SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG
200 { US"sslref2_reuse_cert_type_bug", SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG },
201#endif
202#ifdef SSL_OP_TLS_BLOCK_PADDING_BUG
203 { US"tls_block_padding_bug", SSL_OP_TLS_BLOCK_PADDING_BUG },
204#endif
205#ifdef SSL_OP_TLS_D5_BUG
206 { US"tls_d5_bug", SSL_OP_TLS_D5_BUG },
207#endif
208#ifdef SSL_OP_TLS_ROLLBACK_BUG
209 { US"tls_rollback_bug", SSL_OP_TLS_ROLLBACK_BUG },
210#endif
211};
212
213#ifndef MACRO_PREDEF
214static int exim_openssl_options_size = nelem(exim_openssl_options);
215#endif
216
217#ifdef MACRO_PREDEF
218void
219options_tls(void)
220{
221struct exim_openssl_option * o;
222uschar buf[64];
223
224for (o = exim_openssl_options;
225 o < exim_openssl_options + nelem(exim_openssl_options); o++)
226 {
227 /* Trailing X is workaround for problem with _OPT_OPENSSL_NO_TLSV1
228 being a ".ifdef _OPT_OPENSSL_NO_TLSV1_3" match */
229
230 spf(buf, sizeof(buf), US"_OPT_OPENSSL_%T_X", o->name);
231 builtin_macro_create(buf);
232 }
233}
234#else
235
236/******************************************************************************/
237
059ec3d9
PH
238/* Structure for collecting random data for seeding. */
239
240typedef struct randstuff {
9e3331ea
TK
241 struct timeval tv;
242 pid_t p;
059ec3d9
PH
243} randstuff;
244
245/* Local static variables */
246
a2ff477a
JH
247static BOOL client_verify_callback_called = FALSE;
248static BOOL server_verify_callback_called = FALSE;
059ec3d9
PH
249static const uschar *sid_ctx = US"exim";
250
d4f09789
PP
251/* We have three different contexts to care about.
252
253Simple case: client, `client_ctx`
254 As a client, we can be doing a callout or cut-through delivery while receiving
255 a message. So we have a client context, which should have options initialised
74f1a423
JH
256 from the SMTP Transport. We may also concurrently want to make TLS connections
257 to utility daemons, so client-contexts are allocated and passed around in call
258 args rather than using a gobal.
d4f09789
PP
259
260Server:
261 There are two cases: with and without ServerNameIndication from the client.
262 Given TLS SNI, we can be using different keys, certs and various other
263 configuration settings, because they're re-expanded with $tls_sni set. This
264 allows vhosting with TLS. This SNI is sent in the handshake.
265 A client might not send SNI, so we need a fallback, and an initial setup too.
266 So as a server, we start out using `server_ctx`.
267 If SNI is sent by the client, then we as server, mid-negotiation, try to clone
268 `server_sni` from `server_ctx` and then initialise settings by re-expanding
269 configuration.
270*/
271
74f1a423
JH
272typedef struct {
273 SSL_CTX * ctx;
274 SSL * ssl;
275} exim_openssl_client_tls_ctx;
276
817d9f57 277static SSL_CTX *server_ctx = NULL;
817d9f57 278static SSL *server_ssl = NULL;
389ca47a 279
35731706 280#ifdef EXIM_HAVE_OPENSSL_TLSEXT
817d9f57 281static SSL_CTX *server_sni = NULL;
35731706 282#endif
059ec3d9
PH
283
284static char ssl_errstring[256];
285
286static int ssl_session_timeout = 200;
a2ff477a
JH
287static BOOL client_verify_optional = FALSE;
288static BOOL server_verify_optional = FALSE;
059ec3d9 289
f5d78688 290static BOOL reexpand_tls_files_for_sni = FALSE;
059ec3d9
PH
291
292
7be682ca
PP
293typedef struct tls_ext_ctx_cb {
294 uschar *certificate;
295 uschar *privatekey;
f5d78688 296 BOOL is_server;
a6510420 297#ifndef DISABLE_OCSP
c3033f13 298 STACK_OF(X509) *verify_stack; /* chain for verifying the proof */
f5d78688
JH
299 union {
300 struct {
301 uschar *file;
302 uschar *file_expanded;
303 OCSP_RESPONSE *response;
304 } server;
305 struct {
44662487
JH
306 X509_STORE *verify_store; /* non-null if status requested */
307 BOOL verify_required;
f5d78688
JH
308 } client;
309 } u_ocsp;
3f7eeb86 310#endif
7be682ca
PP
311 uschar *dhparam;
312 /* these are cached from first expand */
313 uschar *server_cipher_list;
314 /* only passed down to tls_error: */
315 host_item *host;
55414b25 316 const uschar * verify_cert_hostnames;
0cbf2b82 317#ifndef DISABLE_EVENT
a7538db1
JH
318 uschar * event_action;
319#endif
7be682ca
PP
320} tls_ext_ctx_cb;
321
322/* should figure out a cleanup of API to handle state preserved per
323implementation, for various reasons, which can be void * in the APIs.
324For now, we hack around it. */
817d9f57
JH
325tls_ext_ctx_cb *client_static_cbinfo = NULL;
326tls_ext_ctx_cb *server_static_cbinfo = NULL;
7be682ca
PP
327
328static int
983207c1 329setup_certs(SSL_CTX *sctx, uschar *certs, uschar *crl, host_item *host, BOOL optional,
cf0c6164 330 int (*cert_vfy_cb)(int, X509_STORE_CTX *), uschar ** errstr );
059ec3d9 331
3f7eeb86 332/* Callbacks */
3bcbbbe2 333#ifdef EXIM_HAVE_OPENSSL_TLSEXT
3f7eeb86 334static int tls_servername_cb(SSL *s, int *ad ARG_UNUSED, void *arg);
3bcbbbe2 335#endif
f2de3a33 336#ifndef DISABLE_OCSP
f5d78688 337static int tls_server_stapling_cb(SSL *s, void *arg);
3f7eeb86
PP
338#endif
339
059ec3d9
PH
340
341/*************************************************
342* Handle TLS error *
343*************************************************/
344
345/* Called from lots of places when errors occur before actually starting to do
346the TLS handshake, that is, while the session is still in clear. Always returns
347DEFER for a server and FAIL for a client so that most calls can use "return
348tls_error(...)" to do this processing and then give an appropriate return. A
349single function is used for both server and client, because it is called from
350some shared functions.
351
352Argument:
353 prefix text to include in the logged error
354 host NULL if setting up a server;
355 the connected host if setting up a client
7199e1ee 356 msg error message or NULL if we should ask OpenSSL
cf0c6164 357 errstr pointer to output error message
059ec3d9
PH
358
359Returns: OK/DEFER/FAIL
360*/
361
362static int
cf0c6164 363tls_error(uschar * prefix, const host_item * host, uschar * msg, uschar ** errstr)
059ec3d9 364{
c562fd30 365if (!msg)
7199e1ee
TF
366 {
367 ERR_error_string(ERR_get_error(), ssl_errstring);
cf0c6164 368 msg = US ssl_errstring;
7199e1ee
TF
369 }
370
cf0c6164
JH
371if (errstr) *errstr = string_sprintf("(%s): %s", prefix, msg);
372return host ? FAIL : DEFER;
059ec3d9
PH
373}
374
375
376
377/*************************************************
378* Callback to generate RSA key *
379*************************************************/
380
381/*
382Arguments:
3ae79556 383 s SSL connection (not used)
059ec3d9
PH
384 export not used
385 keylength keylength
386
387Returns: pointer to generated key
388*/
389
390static RSA *
391rsa_callback(SSL *s, int export, int keylength)
392{
393RSA *rsa_key;
c8dfb21d
JH
394#ifdef EXIM_HAVE_RSA_GENKEY_EX
395BIGNUM *bn = BN_new();
396#endif
397
059ec3d9
PH
398export = export; /* Shut picky compilers up */
399DEBUG(D_tls) debug_printf("Generating %d bit RSA key...\n", keylength);
c8dfb21d
JH
400
401#ifdef EXIM_HAVE_RSA_GENKEY_EX
402if ( !BN_set_word(bn, (unsigned long)RSA_F4)
f2cb6292 403 || !(rsa_key = RSA_new())
c8dfb21d
JH
404 || !RSA_generate_key_ex(rsa_key, keylength, bn, NULL)
405 )
406#else
23bb6982 407if (!(rsa_key = RSA_generate_key(keylength, RSA_F4, NULL, NULL)))
c8dfb21d
JH
408#endif
409
059ec3d9
PH
410 {
411 ERR_error_string(ERR_get_error(), ssl_errstring);
412 log_write(0, LOG_MAIN|LOG_PANIC, "TLS error (RSA_generate_key): %s",
413 ssl_errstring);
414 return NULL;
415 }
416return rsa_key;
417}
418
419
420
f5d78688 421/* Extreme debug
f2de3a33 422#ifndef DISABLE_OCSP
f5d78688
JH
423void
424x509_store_dump_cert_s_names(X509_STORE * store)
425{
426STACK_OF(X509_OBJECT) * roots= store->objs;
427int i;
428static uschar name[256];
429
430for(i= 0; i<sk_X509_OBJECT_num(roots); i++)
431 {
432 X509_OBJECT * tmp_obj= sk_X509_OBJECT_value(roots, i);
433 if(tmp_obj->type == X509_LU_X509)
434 {
435 X509 * current_cert= tmp_obj->data.x509;
436 X509_NAME_oneline(X509_get_subject_name(current_cert), CS name, sizeof(name));
f69979cf 437 name[sizeof(name)-1] = '\0';
f5d78688
JH
438 debug_printf(" %s\n", name);
439 }
440 }
441}
442#endif
443*/
444
059ec3d9 445
0cbf2b82 446#ifndef DISABLE_EVENT
f69979cf
JH
447static int
448verify_event(tls_support * tlsp, X509 * cert, int depth, const uschar * dn,
449 BOOL *calledp, const BOOL *optionalp, const uschar * what)
450{
451uschar * ev;
452uschar * yield;
453X509 * old_cert;
454
455ev = tlsp == &tls_out ? client_static_cbinfo->event_action : event_action;
456if (ev)
457 {
aaba7d03 458 DEBUG(D_tls) debug_printf("verify_event: %s %d\n", what, depth);
f69979cf
JH
459 old_cert = tlsp->peercert;
460 tlsp->peercert = X509_dup(cert);
461 /* NB we do not bother setting peerdn */
462 if ((yield = event_raise(ev, US"tls:cert", string_sprintf("%d", depth))))
463 {
464 log_write(0, LOG_MAIN, "[%s] %s verify denied by event-action: "
465 "depth=%d cert=%s: %s",
466 tlsp == &tls_out ? deliver_host_address : sender_host_address,
467 what, depth, dn, yield);
468 *calledp = TRUE;
469 if (!*optionalp)
470 {
471 if (old_cert) tlsp->peercert = old_cert; /* restore 1st failing cert */
472 return 1; /* reject (leaving peercert set) */
473 }
474 DEBUG(D_tls) debug_printf("Event-action verify failure overridden "
475 "(host in tls_try_verify_hosts)\n");
476 }
477 X509_free(tlsp->peercert);
478 tlsp->peercert = old_cert;
479 }
480return 0;
481}
482#endif
483
059ec3d9
PH
484/*************************************************
485* Callback for verification *
486*************************************************/
487
488/* The SSL library does certificate verification if set up to do so. This
489callback has the current yes/no state is in "state". If verification succeeded,
f69979cf
JH
490we set the certificate-verified flag. If verification failed, what happens
491depends on whether the client is required to present a verifiable certificate
492or not.
059ec3d9
PH
493
494If verification is optional, we change the state to yes, but still log the
495verification error. For some reason (it really would help to have proper
496documentation of OpenSSL), this callback function then gets called again, this
f69979cf
JH
497time with state = 1. We must take care not to set the private verified flag on
498the second time through.
059ec3d9
PH
499
500Note: this function is not called if the client fails to present a certificate
501when asked. We get here only if a certificate has been received. Handling of
502optional verification for this case is done when requesting SSL to verify, by
503setting SSL_VERIFY_FAIL_IF_NO_PEER_CERT in the non-optional case.
504
a7538db1
JH
505May be called multiple times for different issues with a certificate, even
506for a given "depth" in the certificate chain.
507
059ec3d9 508Arguments:
f2f2c91b
JH
509 preverify_ok current yes/no state as 1/0
510 x509ctx certificate information.
511 tlsp per-direction (client vs. server) support data
512 calledp has-been-called flag
513 optionalp verification-is-optional flag
059ec3d9 514
f2f2c91b 515Returns: 0 if verification should fail, otherwise 1
059ec3d9
PH
516*/
517
518static int
f2f2c91b 519verify_callback(int preverify_ok, X509_STORE_CTX *x509ctx,
421aff85 520 tls_support *tlsp, BOOL *calledp, BOOL *optionalp)
059ec3d9 521{
421aff85 522X509 * cert = X509_STORE_CTX_get_current_cert(x509ctx);
a7538db1 523int depth = X509_STORE_CTX_get_error_depth(x509ctx);
f69979cf 524uschar dn[256];
059ec3d9 525
f69979cf
JH
526X509_NAME_oneline(X509_get_subject_name(cert), CS dn, sizeof(dn));
527dn[sizeof(dn)-1] = '\0';
059ec3d9 528
f2f2c91b 529if (preverify_ok == 0)
059ec3d9 530 {
f77197ae
JH
531 uschar * extra = verify_mode ? string_sprintf(" (during %c-verify for [%s])",
532 *verify_mode, sender_host_address)
533 : US"";
534 log_write(0, LOG_MAIN, "[%s] SSL verify error%s: depth=%d error=%s cert=%s",
535 tlsp == &tls_out ? deliver_host_address : sender_host_address,
536 extra, depth,
537 X509_verify_cert_error_string(X509_STORE_CTX_get_error(x509ctx)), dn);
a2ff477a 538 *calledp = TRUE;
9d1c15ef
JH
539 if (!*optionalp)
540 {
f69979cf
JH
541 if (!tlsp->peercert)
542 tlsp->peercert = X509_dup(cert); /* record failing cert */
543 return 0; /* reject */
9d1c15ef 544 }
059ec3d9
PH
545 DEBUG(D_tls) debug_printf("SSL verify failure overridden (host in "
546 "tls_try_verify_hosts)\n");
059ec3d9
PH
547 }
548
a7538db1 549else if (depth != 0)
059ec3d9 550 {
f69979cf 551 DEBUG(D_tls) debug_printf("SSL verify ok: depth=%d SN=%s\n", depth, dn);
f2de3a33 552#ifndef DISABLE_OCSP
f5d78688
JH
553 if (tlsp == &tls_out && client_static_cbinfo->u_ocsp.client.verify_store)
554 { /* client, wanting stapling */
555 /* Add the server cert's signing chain as the one
556 for the verification of the OCSP stapled information. */
94431adb 557
f5d78688 558 if (!X509_STORE_add_cert(client_static_cbinfo->u_ocsp.client.verify_store,
421aff85 559 cert))
f5d78688 560 ERR_clear_error();
c3033f13 561 sk_X509_push(client_static_cbinfo->verify_stack, cert);
f5d78688 562 }
a7538db1 563#endif
0cbf2b82 564#ifndef DISABLE_EVENT
f69979cf
JH
565 if (verify_event(tlsp, cert, depth, dn, calledp, optionalp, US"SSL"))
566 return 0; /* reject, with peercert set */
f5d78688 567#endif
059ec3d9
PH
568 }
569else
570 {
55414b25 571 const uschar * verify_cert_hostnames;
e51c7be2 572
e51c7be2
JH
573 if ( tlsp == &tls_out
574 && ((verify_cert_hostnames = client_static_cbinfo->verify_cert_hostnames)))
afdb5e9c 575 /* client, wanting hostname check */
e51c7be2 576 {
f69979cf 577
740f36d4 578#ifdef EXIM_HAVE_OPENSSL_CHECKHOST
f69979cf
JH
579# ifndef X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS
580# define X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS 0
581# endif
582# ifndef X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS
583# define X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS 0
584# endif
e51c7be2 585 int sep = 0;
55414b25 586 const uschar * list = verify_cert_hostnames;
e51c7be2 587 uschar * name;
d8e7834a
JH
588 int rc;
589 while ((name = string_nextinlist(&list, &sep, NULL, 0)))
f40d5be3 590 if ((rc = X509_check_host(cert, CCS name, 0,
8d692470 591 X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS
740f36d4
JH
592 | X509_CHECK_FLAG_SINGLE_LABEL_SUBDOMAINS,
593 NULL)))
d8e7834a
JH
594 {
595 if (rc < 0)
596 {
93a6fce2 597 log_write(0, LOG_MAIN, "[%s] SSL verify error: internal error",
f77197ae 598 tlsp == &tls_out ? deliver_host_address : sender_host_address);
d8e7834a
JH
599 name = NULL;
600 }
e51c7be2 601 break;
d8e7834a 602 }
e51c7be2 603 if (!name)
f69979cf 604#else
e51c7be2 605 if (!tls_is_name_for_cert(verify_cert_hostnames, cert))
f69979cf 606#endif
e51c7be2 607 {
f77197ae
JH
608 uschar * extra = verify_mode
609 ? string_sprintf(" (during %c-verify for [%s])",
610 *verify_mode, sender_host_address)
611 : US"";
e51c7be2 612 log_write(0, LOG_MAIN,
f77197ae
JH
613 "[%s] SSL verify error%s: certificate name mismatch: DN=\"%s\" H=\"%s\"",
614 tlsp == &tls_out ? deliver_host_address : sender_host_address,
615 extra, dn, verify_cert_hostnames);
a3ef7310
JH
616 *calledp = TRUE;
617 if (!*optionalp)
f69979cf
JH
618 {
619 if (!tlsp->peercert)
620 tlsp->peercert = X509_dup(cert); /* record failing cert */
621 return 0; /* reject */
622 }
a3ef7310
JH
623 DEBUG(D_tls) debug_printf("SSL verify failure overridden (host in "
624 "tls_try_verify_hosts)\n");
e51c7be2 625 }
f69979cf 626 }
e51c7be2 627
0cbf2b82 628#ifndef DISABLE_EVENT
f69979cf
JH
629 if (verify_event(tlsp, cert, depth, dn, calledp, optionalp, US"SSL"))
630 return 0; /* reject, with peercert set */
e51c7be2
JH
631#endif
632
93dcb1c2 633 DEBUG(D_tls) debug_printf("SSL%s verify ok: depth=0 SN=%s\n",
f69979cf 634 *calledp ? "" : " authenticated", dn);
93dcb1c2
JH
635 if (!*calledp) tlsp->certificate_verified = TRUE;
636 *calledp = TRUE;
059ec3d9
PH
637 }
638
a7538db1 639return 1; /* accept, at least for this level */
059ec3d9
PH
640}
641
a2ff477a 642static int
f2f2c91b 643verify_callback_client(int preverify_ok, X509_STORE_CTX *x509ctx)
a2ff477a 644{
f2f2c91b
JH
645return verify_callback(preverify_ok, x509ctx, &tls_out,
646 &client_verify_callback_called, &client_verify_optional);
a2ff477a
JH
647}
648
649static int
f2f2c91b 650verify_callback_server(int preverify_ok, X509_STORE_CTX *x509ctx)
a2ff477a 651{
f2f2c91b
JH
652return verify_callback(preverify_ok, x509ctx, &tls_in,
653 &server_verify_callback_called, &server_verify_optional);
a2ff477a
JH
654}
655
059ec3d9 656
c0635b6d 657#ifdef SUPPORT_DANE
53a7196b 658
e5cccda9
JH
659/* This gets called *by* the dane library verify callback, which interposes
660itself.
661*/
662static int
f2f2c91b 663verify_callback_client_dane(int preverify_ok, X509_STORE_CTX * x509ctx)
e5cccda9
JH
664{
665X509 * cert = X509_STORE_CTX_get_current_cert(x509ctx);
f69979cf 666uschar dn[256];
83b27293 667int depth = X509_STORE_CTX_get_error_depth(x509ctx);
5c75db2e 668#ifndef DISABLE_EVENT
f69979cf 669BOOL dummy_called, optional = FALSE;
83b27293 670#endif
e5cccda9 671
f69979cf
JH
672X509_NAME_oneline(X509_get_subject_name(cert), CS dn, sizeof(dn));
673dn[sizeof(dn)-1] = '\0';
e5cccda9 674
f2f2c91b
JH
675DEBUG(D_tls) debug_printf("verify_callback_client_dane: %s depth %d %s\n",
676 preverify_ok ? "ok":"BAD", depth, dn);
e5cccda9 677
0cbf2b82 678#ifndef DISABLE_EVENT
f69979cf
JH
679 if (verify_event(&tls_out, cert, depth, dn,
680 &dummy_called, &optional, US"DANE"))
681 return 0; /* reject, with peercert set */
83b27293
JH
682#endif
683
f2f2c91b 684if (preverify_ok == 1)
6fbf3599
JH
685 {
686 tls_out.dane_verified = tls_out.certificate_verified = TRUE;
687#ifndef DISABLE_OCSP
688 if (client_static_cbinfo->u_ocsp.client.verify_store)
689 { /* client, wanting stapling */
690 /* Add the server cert's signing chain as the one
691 for the verification of the OCSP stapled information. */
692
693 if (!X509_STORE_add_cert(client_static_cbinfo->u_ocsp.client.verify_store,
694 cert))
695 ERR_clear_error();
696 sk_X509_push(client_static_cbinfo->verify_stack, cert);
697 }
698#endif
699 }
f2f2c91b
JH
700else
701 {
702 int err = X509_STORE_CTX_get_error(x509ctx);
703 DEBUG(D_tls)
704 debug_printf(" - err %d '%s'\n", err, X509_verify_cert_error_string(err));
3c51463e 705 if (err == X509_V_ERR_APPLICATION_VERIFICATION)
f2f2c91b
JH
706 preverify_ok = 1;
707 }
708return preverify_ok;
e5cccda9 709}
53a7196b 710
c0635b6d 711#endif /*SUPPORT_DANE*/
e5cccda9 712
059ec3d9
PH
713
714/*************************************************
715* Information callback *
716*************************************************/
717
718/* The SSL library functions call this from time to time to indicate what they
7be682ca
PP
719are doing. We copy the string to the debugging output when TLS debugging has
720been requested.
059ec3d9
PH
721
722Arguments:
723 s the SSL connection
724 where
725 ret
726
727Returns: nothing
728*/
729
730static void
731info_callback(SSL *s, int where, int ret)
732{
733where = where;
734ret = ret;
735DEBUG(D_tls) debug_printf("SSL info: %s\n", SSL_state_string_long(s));
736}
737
738
739
740/*************************************************
741* Initialize for DH *
742*************************************************/
743
744/* If dhparam is set, expand it, and load up the parameters for DH encryption.
745
746Arguments:
038597d2 747 sctx The current SSL CTX (inbound or outbound)
a799883d 748 dhparam DH parameter file or fixed parameter identity string
7199e1ee 749 host connected host, if client; NULL if server
cf0c6164 750 errstr error string pointer
059ec3d9
PH
751
752Returns: TRUE if OK (nothing to set up, or setup worked)
753*/
754
755static BOOL
cf0c6164 756init_dh(SSL_CTX *sctx, uschar *dhparam, const host_item *host, uschar ** errstr)
059ec3d9 757{
059ec3d9
PH
758BIO *bio;
759DH *dh;
760uschar *dhexpanded;
a799883d 761const char *pem;
6600985a 762int dh_bitsize;
059ec3d9 763
cf0c6164 764if (!expand_check(dhparam, US"tls_dhparam", &dhexpanded, errstr))
059ec3d9
PH
765 return FALSE;
766
0df4ab80 767if (!dhexpanded || !*dhexpanded)
a799883d 768 bio = BIO_new_mem_buf(CS std_dh_prime_default(), -1);
a799883d 769else if (dhexpanded[0] == '/')
059ec3d9 770 {
0df4ab80 771 if (!(bio = BIO_new_file(CS dhexpanded, "r")))
059ec3d9 772 {
7199e1ee 773 tls_error(string_sprintf("could not read dhparams file %s", dhexpanded),
cf0c6164 774 host, US strerror(errno), errstr);
a799883d 775 return FALSE;
059ec3d9 776 }
a799883d
PP
777 }
778else
779 {
780 if (Ustrcmp(dhexpanded, "none") == 0)
059ec3d9 781 {
a799883d
PP
782 DEBUG(D_tls) debug_printf("Requested no DH parameters.\n");
783 return TRUE;
059ec3d9 784 }
a799883d 785
0df4ab80 786 if (!(pem = std_dh_prime_named(dhexpanded)))
a799883d
PP
787 {
788 tls_error(string_sprintf("Unknown standard DH prime \"%s\"", dhexpanded),
cf0c6164 789 host, US strerror(errno), errstr);
a799883d
PP
790 return FALSE;
791 }
792 bio = BIO_new_mem_buf(CS pem, -1);
793 }
794
0df4ab80 795if (!(dh = PEM_read_bio_DHparams(bio, NULL, NULL, NULL)))
a799883d 796 {
059ec3d9 797 BIO_free(bio);
a799883d 798 tls_error(string_sprintf("Could not read tls_dhparams \"%s\"", dhexpanded),
cf0c6164 799 host, NULL, errstr);
a799883d
PP
800 return FALSE;
801 }
802
6600985a
PP
803/* note: our default limit of 2236 is not a multiple of 8; the limit comes from
804 * an NSS limit, and the GnuTLS APIs handle bit-sizes fine, so we went with
805 * 2236. But older OpenSSL can only report in bytes (octets), not bits.
806 * If someone wants to dance at the edge, then they can raise the limit or use
807 * current libraries. */
808#ifdef EXIM_HAVE_OPENSSL_DH_BITS
809/* Added in commit 26c79d5641d; `git describe --contains` says OpenSSL_1_1_0-pre1~1022
810 * This predates OpenSSL_1_1_0 (before a, b, ...) so is in all 1.1.0 */
811dh_bitsize = DH_bits(dh);
812#else
813dh_bitsize = 8 * DH_size(dh);
814#endif
815
a799883d
PP
816/* Even if it is larger, we silently return success rather than cause things
817 * to fail out, so that a too-large DH will not knock out all TLS; it's a
818 * debatable choice. */
6600985a 819if (dh_bitsize > tls_dh_max_bits)
a799883d
PP
820 {
821 DEBUG(D_tls)
170f4904 822 debug_printf("dhparams file %d bits, is > tls_dh_max_bits limit of %d\n",
6600985a 823 dh_bitsize, tls_dh_max_bits);
a799883d
PP
824 }
825else
826 {
827 SSL_CTX_set_tmp_dh(sctx, dh);
828 DEBUG(D_tls)
829 debug_printf("Diffie-Hellman initialized from %s with %d-bit prime\n",
6600985a 830 dhexpanded ? dhexpanded : US"default", dh_bitsize);
059ec3d9
PH
831 }
832
a799883d
PP
833DH_free(dh);
834BIO_free(bio);
835
836return TRUE;
059ec3d9
PH
837}
838
839
840
841
038597d2
PP
842/*************************************************
843* Initialize for ECDH *
844*************************************************/
845
846/* Load parameters for ECDH encryption.
847
848For now, we stick to NIST P-256 because: it's simple and easy to configure;
849it avoids any patent issues that might bite redistributors; despite events in
850the news and concerns over curve choices, we're not cryptographers, we're not
851pretending to be, and this is "good enough" to be better than no support,
852protecting against most adversaries. Given another year or two, there might
853be sufficient clarity about a "right" way forward to let us make an informed
854decision, instead of a knee-jerk reaction.
855
856Longer-term, we should look at supporting both various named curves and
857external files generated with "openssl ecparam", much as we do for init_dh().
858We should also support "none" as a value, to explicitly avoid initialisation.
859
860Patches welcome.
861
862Arguments:
863 sctx The current SSL CTX (inbound or outbound)
864 host connected host, if client; NULL if server
cf0c6164 865 errstr error string pointer
038597d2
PP
866
867Returns: TRUE if OK (nothing to set up, or setup worked)
868*/
869
870static BOOL
cf0c6164 871init_ecdh(SSL_CTX * sctx, host_item * host, uschar ** errstr)
038597d2 872{
63f0dbe0
JH
873#ifdef OPENSSL_NO_ECDH
874return TRUE;
875#else
876
10ca4f1c
JH
877EC_KEY * ecdh;
878uschar * exp_curve;
879int nid;
880BOOL rv;
881
038597d2
PP
882if (host) /* No ECDH setup for clients, only for servers */
883 return TRUE;
884
10ca4f1c 885# ifndef EXIM_HAVE_ECDH
038597d2
PP
886DEBUG(D_tls)
887 debug_printf("No OpenSSL API to define ECDH parameters, skipping\n");
888return TRUE;
038597d2 889# else
10ca4f1c 890
cf0c6164 891if (!expand_check(tls_eccurve, US"tls_eccurve", &exp_curve, errstr))
10ca4f1c
JH
892 return FALSE;
893if (!exp_curve || !*exp_curve)
894 return TRUE;
895
8e53a4fc 896/* "auto" needs to be handled carefully.
4c04137d 897 * OpenSSL < 1.0.2: we do not select anything, but fallback to prime256v1
8e53a4fc 898 * OpenSSL < 1.1.0: we have to call SSL_CTX_set_ecdh_auto
4c04137d 899 * (openssl/ssl.h defines SSL_CTRL_SET_ECDH_AUTO)
8e53a4fc
HSHR
900 * OpenSSL >= 1.1.0: we do not set anything, the libray does autoselection
901 * https://github.com/openssl/openssl/commit/fe6ef2472db933f01b59cad82aa925736935984b
902 */
10ca4f1c 903if (Ustrcmp(exp_curve, "auto") == 0)
038597d2 904 {
8e53a4fc 905#if OPENSSL_VERSION_NUMBER < 0x10002000L
10ca4f1c 906 DEBUG(D_tls) debug_printf(
8e53a4fc 907 "ECDH OpenSSL < 1.0.2: temp key parameter settings: overriding \"auto\" with \"prime256v1\"\n");
78a3bbd5 908 exp_curve = US"prime256v1";
8e53a4fc
HSHR
909#else
910# if defined SSL_CTRL_SET_ECDH_AUTO
911 DEBUG(D_tls) debug_printf(
912 "ECDH OpenSSL 1.0.2+ temp key parameter settings: autoselection\n");
10ca4f1c
JH
913 SSL_CTX_set_ecdh_auto(sctx, 1);
914 return TRUE;
8e53a4fc
HSHR
915# else
916 DEBUG(D_tls) debug_printf(
917 "ECDH OpenSSL 1.1.0+ temp key parameter settings: default selection\n");
918 return TRUE;
919# endif
920#endif
10ca4f1c 921 }
038597d2 922
10ca4f1c
JH
923DEBUG(D_tls) debug_printf("ECDH: curve '%s'\n", exp_curve);
924if ( (nid = OBJ_sn2nid (CCS exp_curve)) == NID_undef
925# ifdef EXIM_HAVE_OPENSSL_EC_NIST2NID
926 && (nid = EC_curve_nist2nid(CCS exp_curve)) == NID_undef
927# endif
928 )
929 {
cf0c6164
JH
930 tls_error(string_sprintf("Unknown curve name tls_eccurve '%s'", exp_curve),
931 host, NULL, errstr);
10ca4f1c
JH
932 return FALSE;
933 }
038597d2 934
10ca4f1c
JH
935if (!(ecdh = EC_KEY_new_by_curve_name(nid)))
936 {
cf0c6164 937 tls_error(US"Unable to create ec curve", host, NULL, errstr);
10ca4f1c 938 return FALSE;
038597d2 939 }
10ca4f1c
JH
940
941/* The "tmp" in the name here refers to setting a temporary key
942not to the stability of the interface. */
943
944if ((rv = SSL_CTX_set_tmp_ecdh(sctx, ecdh) == 0))
cf0c6164 945 tls_error(string_sprintf("Error enabling '%s' curve", exp_curve), host, NULL, errstr);
10ca4f1c
JH
946else
947 DEBUG(D_tls) debug_printf("ECDH: enabled '%s' curve\n", exp_curve);
948
949EC_KEY_free(ecdh);
950return !rv;
951
952# endif /*EXIM_HAVE_ECDH*/
953#endif /*OPENSSL_NO_ECDH*/
038597d2
PP
954}
955
956
957
958
f2de3a33 959#ifndef DISABLE_OCSP
3f7eeb86
PP
960/*************************************************
961* Load OCSP information into state *
962*************************************************/
f5d78688 963/* Called to load the server OCSP response from the given file into memory, once
3f7eeb86
PP
964caller has determined this is needed. Checks validity. Debugs a message
965if invalid.
966
967ASSUMES: single response, for single cert.
968
969Arguments:
970 sctx the SSL_CTX* to update
971 cbinfo various parts of session state
972 expanded the filename putatively holding an OCSP response
973
974*/
975
976static void
f5d78688 977ocsp_load_response(SSL_CTX *sctx, tls_ext_ctx_cb *cbinfo, const uschar *expanded)
3f7eeb86 978{
ee5b1e28
JH
979BIO * bio;
980OCSP_RESPONSE * resp;
981OCSP_BASICRESP * basic_response;
982OCSP_SINGLERESP * single_response;
983ASN1_GENERALIZEDTIME * rev, * thisupd, * nextupd;
ee5b1e28 984STACK_OF(X509) * sk;
3f7eeb86
PP
985unsigned long verify_flags;
986int status, reason, i;
987
f5d78688
JH
988cbinfo->u_ocsp.server.file_expanded = string_copy(expanded);
989if (cbinfo->u_ocsp.server.response)
3f7eeb86 990 {
f5d78688
JH
991 OCSP_RESPONSE_free(cbinfo->u_ocsp.server.response);
992 cbinfo->u_ocsp.server.response = NULL;
3f7eeb86
PP
993 }
994
ee5b1e28 995if (!(bio = BIO_new_file(CS cbinfo->u_ocsp.server.file_expanded, "rb")))
3f7eeb86
PP
996 {
997 DEBUG(D_tls) debug_printf("Failed to open OCSP response file \"%s\"\n",
f5d78688 998 cbinfo->u_ocsp.server.file_expanded);
3f7eeb86
PP
999 return;
1000 }
1001
1002resp = d2i_OCSP_RESPONSE_bio(bio, NULL);
1003BIO_free(bio);
1004if (!resp)
1005 {
1006 DEBUG(D_tls) debug_printf("Error reading OCSP response.\n");
1007 return;
1008 }
1009
ee5b1e28 1010if ((status = OCSP_response_status(resp)) != OCSP_RESPONSE_STATUS_SUCCESSFUL)
3f7eeb86
PP
1011 {
1012 DEBUG(D_tls) debug_printf("OCSP response not valid: %s (%d)\n",
1013 OCSP_response_status_str(status), status);
f5d78688 1014 goto bad;
3f7eeb86
PP
1015 }
1016
ee5b1e28 1017if (!(basic_response = OCSP_response_get1_basic(resp)))
3f7eeb86
PP
1018 {
1019 DEBUG(D_tls)
1020 debug_printf("OCSP response parse error: unable to extract basic response.\n");
f5d78688 1021 goto bad;
3f7eeb86
PP
1022 }
1023
c3033f13 1024sk = cbinfo->verify_stack;
3f7eeb86
PP
1025verify_flags = OCSP_NOVERIFY; /* check sigs, but not purpose */
1026
1027/* May need to expose ability to adjust those flags?
1028OCSP_NOSIGS OCSP_NOVERIFY OCSP_NOCHAIN OCSP_NOCHECKS OCSP_NOEXPLICIT
1029OCSP_TRUSTOTHER OCSP_NOINTERN */
1030
4c04137d 1031/* This does a full verify on the OCSP proof before we load it for serving
ee5b1e28
JH
1032up; possibly overkill - just date-checks might be nice enough.
1033
1034OCSP_basic_verify takes a "store" arg, but does not
1035use it for the chain verification, which is all we do
1036when OCSP_NOVERIFY is set. The content from the wire
1037"basic_response" and a cert-stack "sk" are all that is used.
1038
c3033f13
JH
1039We have a stack, loaded in setup_certs() if tls_verify_certificates
1040was a file (not a directory, or "system"). It is unfortunate we
1041cannot used the connection context store, as that would neatly
1042handle the "system" case too, but there seems to be no library
1043function for getting a stack from a store.
e3555426 1044[ In OpenSSL 1.1 - ? X509_STORE_CTX_get0_chain(ctx) ? ]
c3033f13
JH
1045We do not free the stack since it could be needed a second time for
1046SNI handling.
1047
4c04137d 1048Separately we might try to replace using OCSP_basic_verify() - which seems to not
5ec37a55 1049be a public interface into the OpenSSL library (there's no manual entry) -
ee5b1e28 1050But what with? We also use OCSP_basic_verify in the client stapling callback.
4c04137d 1051And there we NEED it; we must verify that status... unless the
ee5b1e28
JH
1052library does it for us anyway? */
1053
1054if ((i = OCSP_basic_verify(basic_response, sk, NULL, verify_flags)) < 0)
3f7eeb86 1055 {
ee5b1e28
JH
1056 DEBUG(D_tls)
1057 {
3f7eeb86
PP
1058 ERR_error_string(ERR_get_error(), ssl_errstring);
1059 debug_printf("OCSP response verify failure: %s\n", US ssl_errstring);
f5d78688
JH
1060 }
1061 goto bad;
3f7eeb86
PP
1062 }
1063
1064/* Here's the simplifying assumption: there's only one response, for the
1065one certificate we use, and nothing for anything else in a chain. If this
1066proves false, we need to extract a cert id from our issued cert
1067(tls_certificate) and use that for OCSP_resp_find_status() (which finds the
1068right cert in the stack and then calls OCSP_single_get0_status()).
1069
1070I'm hoping to avoid reworking a bunch more of how we handle state here. */
ee5b1e28
JH
1071
1072if (!(single_response = OCSP_resp_get0(basic_response, 0)))
3f7eeb86
PP
1073 {
1074 DEBUG(D_tls)
1075 debug_printf("Unable to get first response from OCSP basic response.\n");
f5d78688 1076 goto bad;
3f7eeb86
PP
1077 }
1078
1079status = OCSP_single_get0_status(single_response, &reason, &rev, &thisupd, &nextupd);
f5d78688 1080if (status != V_OCSP_CERTSTATUS_GOOD)
3f7eeb86 1081 {
f5d78688
JH
1082 DEBUG(D_tls) debug_printf("OCSP response bad cert status: %s (%d) %s (%d)\n",
1083 OCSP_cert_status_str(status), status,
1084 OCSP_crl_reason_str(reason), reason);
1085 goto bad;
3f7eeb86
PP
1086 }
1087
1088if (!OCSP_check_validity(thisupd, nextupd, EXIM_OCSP_SKEW_SECONDS, EXIM_OCSP_MAX_AGE))
1089 {
1090 DEBUG(D_tls) debug_printf("OCSP status invalid times.\n");
f5d78688 1091 goto bad;
3f7eeb86
PP
1092 }
1093
f5d78688 1094supply_response:
47195144 1095 cbinfo->u_ocsp.server.response = resp; /*XXX stack?*/
f5d78688
JH
1096return;
1097
1098bad:
8768d548 1099 if (f.running_in_test_harness)
018058b2
JH
1100 {
1101 extern char ** environ;
1102 uschar ** p;
47195144 1103 if (environ) for (p = USS environ; *p; p++)
018058b2
JH
1104 if (Ustrncmp(*p, "EXIM_TESTHARNESS_DISABLE_OCSPVALIDITYCHECK", 42) == 0)
1105 {
1106 DEBUG(D_tls) debug_printf("Supplying known bad OCSP response\n");
1107 goto supply_response;
1108 }
1109 }
f5d78688 1110return;
3f7eeb86 1111}
f2de3a33 1112#endif /*!DISABLE_OCSP*/
3f7eeb86
PP
1113
1114
1115
1116
23bb6982
JH
1117/* Create and install a selfsigned certificate, for use in server mode */
1118
1119static int
cf0c6164 1120tls_install_selfsign(SSL_CTX * sctx, uschar ** errstr)
23bb6982
JH
1121{
1122X509 * x509 = NULL;
1123EVP_PKEY * pkey;
1124RSA * rsa;
1125X509_NAME * name;
1126uschar * where;
1127
1128where = US"allocating pkey";
1129if (!(pkey = EVP_PKEY_new()))
1130 goto err;
1131
1132where = US"allocating cert";
1133if (!(x509 = X509_new()))
1134 goto err;
1135
1136where = US"generating pkey";
3ae79556 1137if (!(rsa = rsa_callback(NULL, 0, 1024)))
23bb6982
JH
1138 goto err;
1139
4c04137d 1140where = US"assigning pkey";
23bb6982
JH
1141if (!EVP_PKEY_assign_RSA(pkey, rsa))
1142 goto err;
1143
1144X509_set_version(x509, 2); /* N+1 - version 3 */
1613fd68 1145ASN1_INTEGER_set(X509_get_serialNumber(x509), 1);
23bb6982
JH
1146X509_gmtime_adj(X509_get_notBefore(x509), 0);
1147X509_gmtime_adj(X509_get_notAfter(x509), (long)60 * 60); /* 1 hour */
1148X509_set_pubkey(x509, pkey);
1149
1150name = X509_get_subject_name(x509);
1151X509_NAME_add_entry_by_txt(name, "C",
4dc2379a 1152 MBSTRING_ASC, CUS "UK", -1, -1, 0);
23bb6982 1153X509_NAME_add_entry_by_txt(name, "O",
4dc2379a 1154 MBSTRING_ASC, CUS "Exim Developers", -1, -1, 0);
23bb6982 1155X509_NAME_add_entry_by_txt(name, "CN",
4dc2379a 1156 MBSTRING_ASC, CUS smtp_active_hostname, -1, -1, 0);
23bb6982
JH
1157X509_set_issuer_name(x509, name);
1158
1159where = US"signing cert";
1160if (!X509_sign(x509, pkey, EVP_md5()))
1161 goto err;
1162
1163where = US"installing selfsign cert";
1164if (!SSL_CTX_use_certificate(sctx, x509))
1165 goto err;
1166
1167where = US"installing selfsign key";
1168if (!SSL_CTX_use_PrivateKey(sctx, pkey))
1169 goto err;
1170
1171return OK;
1172
1173err:
cf0c6164 1174 (void) tls_error(where, NULL, NULL, errstr);
23bb6982
JH
1175 if (x509) X509_free(x509);
1176 if (pkey) EVP_PKEY_free(pkey);
1177 return DEFER;
1178}
1179
1180
1181
1182
ba86e143
JH
1183static int
1184tls_add_certfile(SSL_CTX * sctx, tls_ext_ctx_cb * cbinfo, uschar * file,
1185 uschar ** errstr)
1186{
1187DEBUG(D_tls) debug_printf("tls_certificate file %s\n", file);
1188if (!SSL_CTX_use_certificate_chain_file(sctx, CS file))
1189 return tls_error(string_sprintf(
1190 "SSL_CTX_use_certificate_chain_file file=%s", file),
1191 cbinfo->host, NULL, errstr);
1192return 0;
1193}
1194
1195static int
1196tls_add_pkeyfile(SSL_CTX * sctx, tls_ext_ctx_cb * cbinfo, uschar * file,
1197 uschar ** errstr)
1198{
1199DEBUG(D_tls) debug_printf("tls_privatekey file %s\n", file);
1200if (!SSL_CTX_use_PrivateKey_file(sctx, CS file, SSL_FILETYPE_PEM))
1201 return tls_error(string_sprintf(
1202 "SSL_CTX_use_PrivateKey_file file=%s", file), cbinfo->host, NULL, errstr);
1203return 0;
1204}
1205
1206
7be682ca
PP
1207/*************************************************
1208* Expand key and cert file specs *
1209*************************************************/
1210
f5d78688 1211/* Called once during tls_init and possibly again during TLS setup, for a
7be682ca
PP
1212new context, if Server Name Indication was used and tls_sni was seen in
1213the certificate string.
1214
1215Arguments:
1216 sctx the SSL_CTX* to update
1217 cbinfo various parts of session state
cf0c6164 1218 errstr error string pointer
7be682ca
PP
1219
1220Returns: OK/DEFER/FAIL
1221*/
1222
1223static int
cf0c6164
JH
1224tls_expand_session_files(SSL_CTX *sctx, tls_ext_ctx_cb *cbinfo,
1225 uschar ** errstr)
7be682ca
PP
1226{
1227uschar *expanded;
1228
23bb6982 1229if (!cbinfo->certificate)
7be682ca 1230 {
ba86e143 1231 if (!cbinfo->is_server) /* client */
23bb6982 1232 return OK;
afdb5e9c 1233 /* server */
cf0c6164 1234 if (tls_install_selfsign(sctx, errstr) != OK)
23bb6982 1235 return DEFER;
7be682ca 1236 }
23bb6982
JH
1237else
1238 {
ba86e143
JH
1239 int err;
1240
23bb6982
JH
1241 if (Ustrstr(cbinfo->certificate, US"tls_sni") ||
1242 Ustrstr(cbinfo->certificate, US"tls_in_sni") ||
1243 Ustrstr(cbinfo->certificate, US"tls_out_sni")
1244 )
1245 reexpand_tls_files_for_sni = TRUE;
7be682ca 1246
cf0c6164 1247 if (!expand_check(cbinfo->certificate, US"tls_certificate", &expanded, errstr))
23bb6982
JH
1248 return DEFER;
1249
ba86e143
JH
1250 if (expanded)
1251 if (cbinfo->is_server)
1252 {
1253 const uschar * file_list = expanded;
1254 int sep = 0;
1255 uschar * file;
1256
1257 while (file = string_nextinlist(&file_list, &sep, NULL, 0))
1258 if ((err = tls_add_certfile(sctx, cbinfo, file, errstr)))
1259 return err;
1260 }
1261 else /* would there ever be a need for multiple client certs? */
1262 if ((err = tls_add_certfile(sctx, cbinfo, expanded, errstr)))
1263 return err;
7be682ca 1264
23bb6982 1265 if (cbinfo->privatekey != NULL &&
cf0c6164 1266 !expand_check(cbinfo->privatekey, US"tls_privatekey", &expanded, errstr))
23bb6982 1267 return DEFER;
7be682ca 1268
23bb6982
JH
1269 /* If expansion was forced to fail, key_expanded will be NULL. If the result
1270 of the expansion is an empty string, ignore it also, and assume the private
1271 key is in the same file as the certificate. */
1272
1273 if (expanded && *expanded)
ba86e143
JH
1274 if (cbinfo->is_server)
1275 {
1276 const uschar * file_list = expanded;
1277 int sep = 0;
1278 uschar * file;
1279
1280 while (file = string_nextinlist(&file_list, &sep, NULL, 0))
1281 if ((err = tls_add_pkeyfile(sctx, cbinfo, file, errstr)))
1282 return err;
1283 }
1284 else /* would there ever be a need for multiple client certs? */
1285 if ((err = tls_add_pkeyfile(sctx, cbinfo, expanded, errstr)))
1286 return err;
7be682ca
PP
1287 }
1288
f2de3a33 1289#ifndef DISABLE_OCSP
f40d5be3 1290if (cbinfo->is_server && cbinfo->u_ocsp.server.file)
3f7eeb86 1291 {
47195144 1292 /*XXX stack*/
cf0c6164 1293 if (!expand_check(cbinfo->u_ocsp.server.file, US"tls_ocsp_file", &expanded, errstr))
3f7eeb86
PP
1294 return DEFER;
1295
f40d5be3 1296 if (expanded && *expanded)
3f7eeb86
PP
1297 {
1298 DEBUG(D_tls) debug_printf("tls_ocsp_file %s\n", expanded);
f40d5be3
JH
1299 if ( cbinfo->u_ocsp.server.file_expanded
1300 && (Ustrcmp(expanded, cbinfo->u_ocsp.server.file_expanded) == 0))
3f7eeb86 1301 {
f40d5be3
JH
1302 DEBUG(D_tls) debug_printf(" - value unchanged, using existing values\n");
1303 }
1304 else
f40d5be3 1305 ocsp_load_response(sctx, cbinfo, expanded);
3f7eeb86
PP
1306 }
1307 }
1308#endif
1309
7be682ca
PP
1310return OK;
1311}
1312
1313
1314
1315
1316/*************************************************
1317* Callback to handle SNI *
1318*************************************************/
1319
1320/* Called when acting as server during the TLS session setup if a Server Name
1321Indication extension was sent by the client.
1322
1323API documentation is OpenSSL s_server.c implementation.
1324
1325Arguments:
1326 s SSL* of the current session
1327 ad unknown (part of OpenSSL API) (unused)
1328 arg Callback of "our" registered data
1329
1330Returns: SSL_TLSEXT_ERR_{OK,ALERT_WARNING,ALERT_FATAL,NOACK}
1331*/
1332
3bcbbbe2 1333#ifdef EXIM_HAVE_OPENSSL_TLSEXT
7be682ca
PP
1334static int
1335tls_servername_cb(SSL *s, int *ad ARG_UNUSED, void *arg)
1336{
1337const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name);
3f7eeb86 1338tls_ext_ctx_cb *cbinfo = (tls_ext_ctx_cb *) arg;
7be682ca 1339int rc;
3f0945ff 1340int old_pool = store_pool;
cf0c6164 1341uschar * dummy_errstr;
7be682ca
PP
1342
1343if (!servername)
1344 return SSL_TLSEXT_ERR_OK;
1345
3f0945ff 1346DEBUG(D_tls) debug_printf("Received TLS SNI \"%s\"%s\n", servername,
7be682ca
PP
1347 reexpand_tls_files_for_sni ? "" : " (unused for certificate selection)");
1348
1349/* Make the extension value available for expansion */
3f0945ff 1350store_pool = POOL_PERM;
817d9f57 1351tls_in.sni = string_copy(US servername);
3f0945ff 1352store_pool = old_pool;
7be682ca
PP
1353
1354if (!reexpand_tls_files_for_sni)
1355 return SSL_TLSEXT_ERR_OK;
1356
1357/* Can't find an SSL_CTX_clone() or equivalent, so we do it manually;
1358not confident that memcpy wouldn't break some internal reference counting.
1359Especially since there's a references struct member, which would be off. */
1360
7a8b9519
JH
1361#ifdef EXIM_HAVE_OPENSSL_TLS_METHOD
1362if (!(server_sni = SSL_CTX_new(TLS_server_method())))
1363#else
0df4ab80 1364if (!(server_sni = SSL_CTX_new(SSLv23_server_method())))
7a8b9519 1365#endif
7be682ca
PP
1366 {
1367 ERR_error_string(ERR_get_error(), ssl_errstring);
1368 DEBUG(D_tls) debug_printf("SSL_CTX_new() failed: %s\n", ssl_errstring);
1369 return SSL_TLSEXT_ERR_NOACK;
1370 }
1371
1372/* Not sure how many of these are actually needed, since SSL object
1373already exists. Might even need this selfsame callback, for reneg? */
1374
817d9f57
JH
1375SSL_CTX_set_info_callback(server_sni, SSL_CTX_get_info_callback(server_ctx));
1376SSL_CTX_set_mode(server_sni, SSL_CTX_get_mode(server_ctx));
1377SSL_CTX_set_options(server_sni, SSL_CTX_get_options(server_ctx));
1378SSL_CTX_set_timeout(server_sni, SSL_CTX_get_timeout(server_ctx));
1379SSL_CTX_set_tlsext_servername_callback(server_sni, tls_servername_cb);
1380SSL_CTX_set_tlsext_servername_arg(server_sni, cbinfo);
038597d2 1381
cf0c6164
JH
1382if ( !init_dh(server_sni, cbinfo->dhparam, NULL, &dummy_errstr)
1383 || !init_ecdh(server_sni, NULL, &dummy_errstr)
038597d2
PP
1384 )
1385 return SSL_TLSEXT_ERR_NOACK;
1386
ca954d7f
JH
1387if ( cbinfo->server_cipher_list
1388 && !SSL_CTX_set_cipher_list(server_sni, CS cbinfo->server_cipher_list))
1389 return SSL_TLSEXT_ERR_NOACK;
1390
f2de3a33 1391#ifndef DISABLE_OCSP
f5d78688 1392if (cbinfo->u_ocsp.server.file)
3f7eeb86 1393 {
f5d78688 1394 SSL_CTX_set_tlsext_status_cb(server_sni, tls_server_stapling_cb);
14c7b357 1395 SSL_CTX_set_tlsext_status_arg(server_sni, cbinfo);
3f7eeb86
PP
1396 }
1397#endif
7be682ca 1398
c3033f13 1399if ((rc = setup_certs(server_sni, tls_verify_certificates, tls_crl, NULL, FALSE,
cf0c6164 1400 verify_callback_server, &dummy_errstr)) != OK)
c3033f13 1401 return SSL_TLSEXT_ERR_NOACK;
7be682ca 1402
3f7eeb86
PP
1403/* do this after setup_certs, because this can require the certs for verifying
1404OCSP information. */
cf0c6164 1405if ((rc = tls_expand_session_files(server_sni, cbinfo, &dummy_errstr)) != OK)
0df4ab80 1406 return SSL_TLSEXT_ERR_NOACK;
a799883d 1407
7be682ca 1408DEBUG(D_tls) debug_printf("Switching SSL context.\n");
817d9f57 1409SSL_set_SSL_CTX(s, server_sni);
7be682ca
PP
1410
1411return SSL_TLSEXT_ERR_OK;
1412}
3bcbbbe2 1413#endif /* EXIM_HAVE_OPENSSL_TLSEXT */
7be682ca
PP
1414
1415
1416
1417
f2de3a33 1418#ifndef DISABLE_OCSP
f5d78688 1419
3f7eeb86
PP
1420/*************************************************
1421* Callback to handle OCSP Stapling *
1422*************************************************/
1423
1424/* Called when acting as server during the TLS session setup if the client
1425requests OCSP information with a Certificate Status Request.
1426
1427Documentation via openssl s_server.c and the Apache patch from the OpenSSL
1428project.
1429
1430*/
1431
1432static int
f5d78688 1433tls_server_stapling_cb(SSL *s, void *arg)
3f7eeb86
PP
1434{
1435const tls_ext_ctx_cb *cbinfo = (tls_ext_ctx_cb *) arg;
47195144 1436uschar *response_der; /*XXX blob */
3f7eeb86
PP
1437int response_der_len;
1438
47195144
JH
1439/*XXX stack: use SSL_get_certificate() to see which cert; from that work
1440out which ocsp blob to send. Unfortunately, SSL_get_certificate is known
1441buggy in current OpenSSL; it returns the last cert loaded always rather than
1442the one actually presented. So we can't support a stack of OCSP proofs at
1443this time. */
1444
af4a1bca 1445DEBUG(D_tls)
b3ef41c9 1446 debug_printf("Received TLS status request (OCSP stapling); %s response\n",
f5d78688
JH
1447 cbinfo->u_ocsp.server.response ? "have" : "lack");
1448
44662487 1449tls_in.ocsp = OCSP_NOT_RESP;
f5d78688 1450if (!cbinfo->u_ocsp.server.response)
3f7eeb86
PP
1451 return SSL_TLSEXT_ERR_NOACK;
1452
1453response_der = NULL;
47195144 1454response_der_len = i2d_OCSP_RESPONSE(cbinfo->u_ocsp.server.response, /*XXX stack*/
44662487 1455 &response_der);
3f7eeb86
PP
1456if (response_der_len <= 0)
1457 return SSL_TLSEXT_ERR_NOACK;
1458
5e55c7a9 1459SSL_set_tlsext_status_ocsp_resp(server_ssl, response_der, response_der_len);
44662487 1460tls_in.ocsp = OCSP_VFIED;
3f7eeb86
PP
1461return SSL_TLSEXT_ERR_OK;
1462}
1463
3f7eeb86 1464
f5d78688
JH
1465static void
1466time_print(BIO * bp, const char * str, ASN1_GENERALIZEDTIME * time)
1467{
1468BIO_printf(bp, "\t%s: ", str);
1469ASN1_GENERALIZEDTIME_print(bp, time);
1470BIO_puts(bp, "\n");
1471}
1472
1473static int
1474tls_client_stapling_cb(SSL *s, void *arg)
1475{
1476tls_ext_ctx_cb * cbinfo = arg;
1477const unsigned char * p;
1478int len;
1479OCSP_RESPONSE * rsp;
1480OCSP_BASICRESP * bs;
1481int i;
1482
1483DEBUG(D_tls) debug_printf("Received TLS status response (OCSP stapling):");
1484len = SSL_get_tlsext_status_ocsp_resp(s, &p);
1485if(!p)
1486 {
44662487 1487 /* Expect this when we requested ocsp but got none */
6c6d6e48 1488 if (cbinfo->u_ocsp.client.verify_required && LOGGING(tls_cipher))
44662487 1489 log_write(0, LOG_MAIN, "Received TLS status callback, null content");
f5d78688
JH
1490 else
1491 DEBUG(D_tls) debug_printf(" null\n");
44662487 1492 return cbinfo->u_ocsp.client.verify_required ? 0 : 1;
f5d78688 1493 }
018058b2 1494
f5d78688
JH
1495if(!(rsp = d2i_OCSP_RESPONSE(NULL, &p, len)))
1496 {
018058b2 1497 tls_out.ocsp = OCSP_FAILED;
6c6d6e48 1498 if (LOGGING(tls_cipher))
1eca31ca 1499 log_write(0, LOG_MAIN, "Received TLS cert status response, parse error");
f5d78688
JH
1500 else
1501 DEBUG(D_tls) debug_printf(" parse error\n");
1502 return 0;
1503 }
1504
1505if(!(bs = OCSP_response_get1_basic(rsp)))
1506 {
018058b2 1507 tls_out.ocsp = OCSP_FAILED;
6c6d6e48 1508 if (LOGGING(tls_cipher))
1eca31ca 1509 log_write(0, LOG_MAIN, "Received TLS cert status response, error parsing response");
f5d78688
JH
1510 else
1511 DEBUG(D_tls) debug_printf(" error parsing response\n");
1512 OCSP_RESPONSE_free(rsp);
1513 return 0;
1514 }
1515
1516/* We'd check the nonce here if we'd put one in the request. */
1517/* However that would defeat cacheability on the server so we don't. */
1518
f5d78688
JH
1519/* This section of code reworked from OpenSSL apps source;
1520 The OpenSSL Project retains copyright:
1521 Copyright (c) 1999 The OpenSSL Project. All rights reserved.
1522*/
1523 {
1524 BIO * bp = NULL;
f5d78688
JH
1525 int status, reason;
1526 ASN1_GENERALIZEDTIME *rev, *thisupd, *nextupd;
1527
57887ecc 1528 DEBUG(D_tls) bp = BIO_new_fp(debug_file, BIO_NOCLOSE);
f5d78688
JH
1529
1530 /*OCSP_RESPONSE_print(bp, rsp, 0); extreme debug: stapling content */
1531
1532 /* Use the chain that verified the server cert to verify the stapled info */
1533 /* DEBUG(D_tls) x509_store_dump_cert_s_names(cbinfo->u_ocsp.client.verify_store); */
1534
c3033f13 1535 if ((i = OCSP_basic_verify(bs, cbinfo->verify_stack,
44662487 1536 cbinfo->u_ocsp.client.verify_store, 0)) <= 0)
f5d78688 1537 {
018058b2 1538 tls_out.ocsp = OCSP_FAILED;
57887ecc
JH
1539 if (LOGGING(tls_cipher)) log_write(0, LOG_MAIN,
1540 "Received TLS cert status response, itself unverifiable: %s",
1541 ERR_reason_error_string(ERR_peek_error()));
f5d78688
JH
1542 BIO_printf(bp, "OCSP response verify failure\n");
1543 ERR_print_errors(bp);
57887ecc 1544 OCSP_RESPONSE_print(bp, rsp, 0);
c8dfb21d 1545 goto failed;
f5d78688
JH
1546 }
1547
1548 BIO_printf(bp, "OCSP response well-formed and signed OK\n");
1549
c8dfb21d
JH
1550 /*XXX So we have a good stapled OCSP status. How do we know
1551 it is for the cert of interest? OpenSSL 1.1.0 has a routine
1552 OCSP_resp_find_status() which matches on a cert id, which presumably
1553 we should use. Making an id needs OCSP_cert_id_new(), which takes
1554 issuerName, issuerKey, serialNumber. Are they all in the cert?
1555
1556 For now, carry on blindly accepting the resp. */
1557
f5d78688 1558 {
f5d78688
JH
1559 OCSP_SINGLERESP * single;
1560
c8dfb21d
JH
1561#ifdef EXIM_HAVE_OCSP_RESP_COUNT
1562 if (OCSP_resp_count(bs) != 1)
1563#else
1564 STACK_OF(OCSP_SINGLERESP) * sresp = bs->tbsResponseData->responses;
f5d78688 1565 if (sk_OCSP_SINGLERESP_num(sresp) != 1)
c8dfb21d 1566#endif
f5d78688 1567 {
018058b2 1568 tls_out.ocsp = OCSP_FAILED;
44662487
JH
1569 log_write(0, LOG_MAIN, "OCSP stapling "
1570 "with multiple responses not handled");
c8dfb21d 1571 goto failed;
f5d78688
JH
1572 }
1573 single = OCSP_resp_get0(bs, 0);
44662487
JH
1574 status = OCSP_single_get0_status(single, &reason, &rev,
1575 &thisupd, &nextupd);
f5d78688
JH
1576 }
1577
f5d78688
JH
1578 DEBUG(D_tls) time_print(bp, "This OCSP Update", thisupd);
1579 DEBUG(D_tls) if(nextupd) time_print(bp, "Next OCSP Update", nextupd);
44662487
JH
1580 if (!OCSP_check_validity(thisupd, nextupd,
1581 EXIM_OCSP_SKEW_SECONDS, EXIM_OCSP_MAX_AGE))
f5d78688 1582 {
018058b2 1583 tls_out.ocsp = OCSP_FAILED;
f5d78688
JH
1584 DEBUG(D_tls) ERR_print_errors(bp);
1585 log_write(0, LOG_MAIN, "Server OSCP dates invalid");
f5d78688 1586 }
44662487 1587 else
f5d78688 1588 {
44662487
JH
1589 DEBUG(D_tls) BIO_printf(bp, "Certificate status: %s\n",
1590 OCSP_cert_status_str(status));
1591 switch(status)
1592 {
1593 case V_OCSP_CERTSTATUS_GOOD:
44662487 1594 tls_out.ocsp = OCSP_VFIED;
018058b2 1595 i = 1;
c8dfb21d 1596 goto good;
44662487 1597 case V_OCSP_CERTSTATUS_REVOKED:
018058b2 1598 tls_out.ocsp = OCSP_FAILED;
44662487
JH
1599 log_write(0, LOG_MAIN, "Server certificate revoked%s%s",
1600 reason != -1 ? "; reason: " : "",
1601 reason != -1 ? OCSP_crl_reason_str(reason) : "");
1602 DEBUG(D_tls) time_print(bp, "Revocation Time", rev);
44662487
JH
1603 break;
1604 default:
018058b2 1605 tls_out.ocsp = OCSP_FAILED;
44662487
JH
1606 log_write(0, LOG_MAIN,
1607 "Server certificate status unknown, in OCSP stapling");
44662487
JH
1608 break;
1609 }
f5d78688 1610 }
c8dfb21d
JH
1611 failed:
1612 i = cbinfo->u_ocsp.client.verify_required ? 0 : 1;
1613 good:
f5d78688
JH
1614 BIO_free(bp);
1615 }
1616
1617OCSP_RESPONSE_free(rsp);
1618return i;
1619}
f2de3a33 1620#endif /*!DISABLE_OCSP*/
3f7eeb86
PP
1621
1622
059ec3d9
PH
1623/*************************************************
1624* Initialize for TLS *
1625*************************************************/
1626
e51c7be2
JH
1627/* Called from both server and client code, to do preliminary initialization
1628of the library. We allocate and return a context structure.
059ec3d9
PH
1629
1630Arguments:
946ecbe0 1631 ctxp returned SSL context
059ec3d9
PH
1632 host connected host, if client; NULL if server
1633 dhparam DH parameter file
1634 certificate certificate file
1635 privatekey private key
f5d78688 1636 ocsp_file file of stapling info (server); flag for require ocsp (client)
059ec3d9 1637 addr address if client; NULL if server (for some randomness)
946ecbe0 1638 cbp place to put allocated callback context
cf0c6164 1639 errstr error string pointer
059ec3d9
PH
1640
1641Returns: OK/DEFER/FAIL
1642*/
1643
1644static int
817d9f57 1645tls_init(SSL_CTX **ctxp, host_item *host, uschar *dhparam, uschar *certificate,
3f7eeb86 1646 uschar *privatekey,
f2de3a33 1647#ifndef DISABLE_OCSP
47195144 1648 uschar *ocsp_file, /*XXX stack, in server*/
3f7eeb86 1649#endif
cf0c6164 1650 address_item *addr, tls_ext_ctx_cb ** cbp, uschar ** errstr)
059ec3d9 1651{
7006ee24 1652SSL_CTX * ctx;
77bb000f 1653long init_options;
7be682ca 1654int rc;
a7538db1 1655tls_ext_ctx_cb * cbinfo;
7be682ca
PP
1656
1657cbinfo = store_malloc(sizeof(tls_ext_ctx_cb));
1658cbinfo->certificate = certificate;
1659cbinfo->privatekey = privatekey;
a6510420 1660cbinfo->is_server = host==NULL;
f2de3a33 1661#ifndef DISABLE_OCSP
c3033f13 1662cbinfo->verify_stack = NULL;
a6510420 1663if (!host)
f5d78688
JH
1664 {
1665 cbinfo->u_ocsp.server.file = ocsp_file;
1666 cbinfo->u_ocsp.server.file_expanded = NULL;
1667 cbinfo->u_ocsp.server.response = NULL;
1668 }
1669else
1670 cbinfo->u_ocsp.client.verify_store = NULL;
3f7eeb86 1671#endif
7be682ca 1672cbinfo->dhparam = dhparam;
0df4ab80 1673cbinfo->server_cipher_list = NULL;
7be682ca 1674cbinfo->host = host;
0cbf2b82 1675#ifndef DISABLE_EVENT
a7538db1
JH
1676cbinfo->event_action = NULL;
1677#endif
77bb000f 1678
059ec3d9
PH
1679SSL_load_error_strings(); /* basic set up */
1680OpenSSL_add_ssl_algorithms();
1681
c8dfb21d 1682#ifdef EXIM_HAVE_SHA256
77bb000f 1683/* SHA256 is becoming ever more popular. This makes sure it gets added to the
a0475b69
TK
1684list of available digests. */
1685EVP_add_digest(EVP_sha256());
cf1ef1a9 1686#endif
a0475b69 1687
f0f5a555
PP
1688/* Create a context.
1689The OpenSSL docs in 1.0.1b have not been updated to clarify TLS variant
1690negotiation in the different methods; as far as I can tell, the only
1691*_{server,client}_method which allows negotiation is SSLv23, which exists even
1692when OpenSSL is built without SSLv2 support.
1693By disabling with openssl_options, we can let admins re-enable with the
1694existing knob. */
059ec3d9 1695
7a8b9519
JH
1696#ifdef EXIM_HAVE_OPENSSL_TLS_METHOD
1697if (!(ctx = SSL_CTX_new(host ? TLS_client_method() : TLS_server_method())))
1698#else
7006ee24 1699if (!(ctx = SSL_CTX_new(host ? SSLv23_client_method() : SSLv23_server_method())))
7a8b9519 1700#endif
7006ee24 1701 return tls_error(US"SSL_CTX_new", host, NULL, errstr);
059ec3d9
PH
1702
1703/* It turns out that we need to seed the random number generator this early in
1704order to get the full complement of ciphers to work. It took me roughly a day
1705of work to discover this by experiment.
1706
1707On systems that have /dev/urandom, SSL may automatically seed itself from
1708there. Otherwise, we have to make something up as best we can. Double check
1709afterwards. */
1710
1711if (!RAND_status())
1712 {
1713 randstuff r;
9e3331ea 1714 gettimeofday(&r.tv, NULL);
059ec3d9
PH
1715 r.p = getpid();
1716
5903c6ff
JH
1717 RAND_seed(US (&r), sizeof(r));
1718 RAND_seed(US big_buffer, big_buffer_size);
1719 if (addr != NULL) RAND_seed(US addr, sizeof(addr));
059ec3d9
PH
1720
1721 if (!RAND_status())
7199e1ee 1722 return tls_error(US"RAND_status", host,
cf0c6164 1723 US"unable to seed random number generator", errstr);
059ec3d9
PH
1724 }
1725
1726/* Set up the information callback, which outputs if debugging is at a suitable
1727level. */
1728
7006ee24 1729DEBUG(D_tls) SSL_CTX_set_info_callback(ctx, (void (*)())info_callback);
059ec3d9 1730
c80c5570 1731/* Automatically re-try reads/writes after renegotiation. */
7006ee24 1732(void) SSL_CTX_set_mode(ctx, SSL_MODE_AUTO_RETRY);
c80c5570 1733
77bb000f
PP
1734/* Apply administrator-supplied work-arounds.
1735Historically we applied just one requested option,
1736SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS, but when bug 994 requested a second, we
1737moved to an administrator-controlled list of options to specify and
1738grandfathered in the first one as the default value for "openssl_options".
059ec3d9 1739
77bb000f
PP
1740No OpenSSL version number checks: the options we accept depend upon the
1741availability of the option value macros from OpenSSL. */
059ec3d9 1742
7006ee24 1743if (!tls_openssl_options_parse(openssl_options, &init_options))
cf0c6164 1744 return tls_error(US"openssl_options parsing failed", host, NULL, errstr);
77bb000f
PP
1745
1746if (init_options)
1747 {
1748 DEBUG(D_tls) debug_printf("setting SSL CTX options: %#lx\n", init_options);
7006ee24 1749 if (!(SSL_CTX_set_options(ctx, init_options)))
77bb000f 1750 return tls_error(string_sprintf(
cf0c6164 1751 "SSL_CTX_set_option(%#lx)", init_options), host, NULL, errstr);
77bb000f
PP
1752 }
1753else
1754 DEBUG(D_tls) debug_printf("no SSL CTX options to set\n");
059ec3d9 1755
a28050f8
JH
1756/* We'd like to disable session cache unconditionally, but foolish Outlook
1757Express clients then give up the first TLS connection and make a second one
1758(which works). Only when there is an IMAP service on the same machine.
1759Presumably OE is trying to use the cache for A on B. Leave it enabled for
1760now, until we work out a decent way of presenting control to the config. It
1761will never be used because we use a new context every time. */
1762#ifdef notdef
7006ee24 1763(void) SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_OFF);
a28050f8 1764#endif
7006ee24 1765
059ec3d9 1766/* Initialize with DH parameters if supplied */
10ca4f1c 1767/* Initialize ECDH temp key parameter selection */
059ec3d9 1768
7006ee24
JH
1769if ( !init_dh(ctx, dhparam, host, errstr)
1770 || !init_ecdh(ctx, host, errstr)
038597d2
PP
1771 )
1772 return DEFER;
059ec3d9 1773
3f7eeb86 1774/* Set up certificate and key (and perhaps OCSP info) */
059ec3d9 1775
7006ee24 1776if ((rc = tls_expand_session_files(ctx, cbinfo, errstr)) != OK)
23bb6982 1777 return rc;
c91535f3 1778
c3033f13
JH
1779/* If we need to handle SNI or OCSP, do so */
1780
3bcbbbe2 1781#ifdef EXIM_HAVE_OPENSSL_TLSEXT
c3033f13
JH
1782# ifndef DISABLE_OCSP
1783 if (!(cbinfo->verify_stack = sk_X509_new_null()))
1784 {
1785 DEBUG(D_tls) debug_printf("failed to create stack for stapling verify\n");
1786 return FAIL;
1787 }
1788# endif
1789
7a8b9519 1790if (!host) /* server */
3f0945ff 1791 {
f2de3a33 1792# ifndef DISABLE_OCSP
f5d78688 1793 /* We check u_ocsp.server.file, not server.response, because we care about if
3f7eeb86
PP
1794 the option exists, not what the current expansion might be, as SNI might
1795 change the certificate and OCSP file in use between now and the time the
1796 callback is invoked. */
f5d78688 1797 if (cbinfo->u_ocsp.server.file)
3f7eeb86 1798 {
7006ee24
JH
1799 SSL_CTX_set_tlsext_status_cb(ctx, tls_server_stapling_cb);
1800 SSL_CTX_set_tlsext_status_arg(ctx, cbinfo);
3f7eeb86 1801 }
f5d78688 1802# endif
3f0945ff
PP
1803 /* We always do this, so that $tls_sni is available even if not used in
1804 tls_certificate */
7006ee24
JH
1805 SSL_CTX_set_tlsext_servername_callback(ctx, tls_servername_cb);
1806 SSL_CTX_set_tlsext_servername_arg(ctx, cbinfo);
3f0945ff 1807 }
f2de3a33 1808# ifndef DISABLE_OCSP
f5d78688
JH
1809else /* client */
1810 if(ocsp_file) /* wanting stapling */
1811 {
1812 if (!(cbinfo->u_ocsp.client.verify_store = X509_STORE_new()))
1813 {
1814 DEBUG(D_tls) debug_printf("failed to create store for stapling verify\n");
1815 return FAIL;
1816 }
7006ee24
JH
1817 SSL_CTX_set_tlsext_status_cb(ctx, tls_client_stapling_cb);
1818 SSL_CTX_set_tlsext_status_arg(ctx, cbinfo);
f5d78688
JH
1819 }
1820# endif
7be682ca 1821#endif
059ec3d9 1822
e51c7be2 1823cbinfo->verify_cert_hostnames = NULL;
e51c7be2 1824
c8dfb21d 1825#ifdef EXIM_HAVE_EPHEM_RSA_KEX
059ec3d9 1826/* Set up the RSA callback */
7006ee24 1827SSL_CTX_set_tmp_rsa_callback(ctx, rsa_callback);
c8dfb21d 1828#endif
059ec3d9
PH
1829
1830/* Finally, set the timeout, and we are done */
1831
7006ee24 1832SSL_CTX_set_timeout(ctx, ssl_session_timeout);
059ec3d9 1833DEBUG(D_tls) debug_printf("Initialized TLS\n");
7be682ca 1834
817d9f57 1835*cbp = cbinfo;
7006ee24 1836*ctxp = ctx;
7be682ca 1837
059ec3d9
PH
1838return OK;
1839}
1840
1841
1842
1843
1844/*************************************************
1845* Get name of cipher in use *
1846*************************************************/
1847
817d9f57 1848/*
059ec3d9 1849Argument: pointer to an SSL structure for the connection
817d9f57
JH
1850 buffer to use for answer
1851 size of buffer
1852 pointer to number of bits for cipher
059ec3d9
PH
1853Returns: nothing
1854*/
1855
1856static void
817d9f57 1857construct_cipher_name(SSL *ssl, uschar *cipherbuf, int bsize, int *bits)
059ec3d9 1858{
7a8b9519 1859/* With OpenSSL 1.0.0a, 'c' needs to be const but the documentation doesn't
57b3a7f5
PP
1860yet reflect that. It should be a safe change anyway, even 0.9.8 versions have
1861the accessor functions use const in the prototype. */
059ec3d9 1862
7a8b9519
JH
1863const uschar * ver = CUS SSL_get_version(ssl);
1864const SSL_CIPHER * c = (const SSL_CIPHER *) SSL_get_current_cipher(ssl);
059ec3d9 1865
817d9f57 1866SSL_CIPHER_get_bits(c, bits);
059ec3d9 1867
817d9f57
JH
1868string_format(cipherbuf, bsize, "%s:%s:%u", ver,
1869 SSL_CIPHER_get_name(c), *bits);
059ec3d9
PH
1870
1871DEBUG(D_tls) debug_printf("Cipher: %s\n", cipherbuf);
1872}
1873
1874
f69979cf
JH
1875static void
1876peer_cert(SSL * ssl, tls_support * tlsp, uschar * peerdn, unsigned bsize)
1877{
1878/*XXX we might consider a list-of-certs variable for the cert chain.
1879SSL_get_peer_cert_chain(SSL*). We'd need a new variable type and support
1880in list-handling functions, also consider the difference between the entire
1881chain and the elements sent by the peer. */
1882
1883/* Will have already noted peercert on a verify fail; possibly not the leaf */
1884if (!tlsp->peercert)
1885 tlsp->peercert = SSL_get_peer_certificate(ssl);
1886/* Beware anonymous ciphers which lead to server_cert being NULL */
1887if (tlsp->peercert)
1888 {
1889 X509_NAME_oneline(X509_get_subject_name(tlsp->peercert), CS peerdn, bsize);
1890 peerdn[bsize-1] = '\0';
1891 tlsp->peerdn = peerdn; /*XXX a static buffer... */
1892 }
1893else
1894 tlsp->peerdn = NULL;
1895}
1896
1897
059ec3d9
PH
1898
1899
1900
1901/*************************************************
1902* Set up for verifying certificates *
1903*************************************************/
1904
0e8aed8a 1905#ifndef DISABLE_OCSP
c3033f13
JH
1906/* Load certs from file, return TRUE on success */
1907
1908static BOOL
1909chain_from_pem_file(const uschar * file, STACK_OF(X509) * verify_stack)
1910{
1911BIO * bp;
1912X509 * x;
1913
dec766a1
WB
1914while (sk_X509_num(verify_stack) > 0)
1915 X509_free(sk_X509_pop(verify_stack));
1916
c3033f13
JH
1917if (!(bp = BIO_new_file(CS file, "r"))) return FALSE;
1918while ((x = PEM_read_bio_X509(bp, NULL, 0, NULL)))
1919 sk_X509_push(verify_stack, x);
1920BIO_free(bp);
1921return TRUE;
1922}
0e8aed8a 1923#endif
c3033f13
JH
1924
1925
1926
dec766a1
WB
1927/* Called by both client and server startup; on the server possibly
1928repeated after a Server Name Indication.
059ec3d9
PH
1929
1930Arguments:
7be682ca 1931 sctx SSL_CTX* to initialise
059ec3d9
PH
1932 certs certs file or NULL
1933 crl CRL file or NULL
1934 host NULL in a server; the remote host in a client
1935 optional TRUE if called from a server for a host in tls_try_verify_hosts;
1936 otherwise passed as FALSE
983207c1 1937 cert_vfy_cb Callback function for certificate verification
cf0c6164 1938 errstr error string pointer
059ec3d9
PH
1939
1940Returns: OK/DEFER/FAIL
1941*/
1942
1943static int
983207c1 1944setup_certs(SSL_CTX *sctx, uschar *certs, uschar *crl, host_item *host, BOOL optional,
cf0c6164 1945 int (*cert_vfy_cb)(int, X509_STORE_CTX *), uschar ** errstr)
059ec3d9
PH
1946{
1947uschar *expcerts, *expcrl;
1948
cf0c6164 1949if (!expand_check(certs, US"tls_verify_certificates", &expcerts, errstr))
059ec3d9 1950 return DEFER;
57cc2785 1951DEBUG(D_tls) debug_printf("tls_verify_certificates: %s\n", expcerts);
059ec3d9 1952
10a831a3 1953if (expcerts && *expcerts)
059ec3d9 1954 {
10a831a3
JH
1955 /* Tell the library to use its compiled-in location for the system default
1956 CA bundle. Then add the ones specified in the config, if any. */
cb1d7830 1957
10a831a3 1958 if (!SSL_CTX_set_default_verify_paths(sctx))
cf0c6164 1959 return tls_error(US"SSL_CTX_set_default_verify_paths", host, NULL, errstr);
10a831a3
JH
1960
1961 if (Ustrcmp(expcerts, "system") != 0)
059ec3d9 1962 {
cb1d7830
JH
1963 struct stat statbuf;
1964
cb1d7830
JH
1965 if (Ustat(expcerts, &statbuf) < 0)
1966 {
1967 log_write(0, LOG_MAIN|LOG_PANIC,
1968 "failed to stat %s for certificates", expcerts);
1969 return DEFER;
1970 }
059ec3d9 1971 else
059ec3d9 1972 {
cb1d7830
JH
1973 uschar *file, *dir;
1974 if ((statbuf.st_mode & S_IFMT) == S_IFDIR)
1975 { file = NULL; dir = expcerts; }
1976 else
c3033f13
JH
1977 {
1978 file = expcerts; dir = NULL;
1979#ifndef DISABLE_OCSP
1980 /* In the server if we will be offering an OCSP proof, load chain from
1981 file for verifying the OCSP proof at load time. */
1982
1983 if ( !host
1984 && statbuf.st_size > 0
1985 && server_static_cbinfo->u_ocsp.server.file
1986 && !chain_from_pem_file(file, server_static_cbinfo->verify_stack)
1987 )
1988 {
1989 log_write(0, LOG_MAIN|LOG_PANIC,
57887ecc 1990 "failed to load cert chain from %s", file);
c3033f13
JH
1991 return DEFER;
1992 }
1993#endif
1994 }
cb1d7830
JH
1995
1996 /* If a certificate file is empty, the next function fails with an
1997 unhelpful error message. If we skip it, we get the correct behaviour (no
1998 certificates are recognized, but the error message is still misleading (it
c3033f13 1999 says no certificate was supplied). But this is better. */
cb1d7830 2000
f2f2c91b
JH
2001 if ( (!file || statbuf.st_size > 0)
2002 && !SSL_CTX_load_verify_locations(sctx, CS file, CS dir))
cf0c6164 2003 return tls_error(US"SSL_CTX_load_verify_locations", host, NULL, errstr);
cb1d7830
JH
2004
2005 /* Load the list of CAs for which we will accept certs, for sending
2006 to the client. This is only for the one-file tls_verify_certificates
2007 variant.
2008 If a list isn't loaded into the server, but
2009 some verify locations are set, the server end appears to make
4c04137d 2010 a wildcard request for client certs.
10a831a3 2011 Meanwhile, the client library as default behaviour *ignores* the list
cb1d7830
JH
2012 we send over the wire - see man SSL_CTX_set_client_cert_cb.
2013 Because of this, and that the dir variant is likely only used for
2014 the public-CA bundle (not for a private CA), not worth fixing.
2015 */
f2f2c91b 2016 if (file)
cb1d7830 2017 {
2009ecca 2018 STACK_OF(X509_NAME) * names = SSL_load_client_CA_file(CS file);
dec766a1
WB
2019
2020 SSL_CTX_set_client_CA_list(sctx, names);
f2f2c91b 2021 DEBUG(D_tls) debug_printf("Added %d certificate authorities.\n",
cb1d7830 2022 sk_X509_NAME_num(names));
cb1d7830 2023 }
059ec3d9
PH
2024 }
2025 }
2026
2027 /* Handle a certificate revocation list. */
2028
10a831a3 2029#if OPENSSL_VERSION_NUMBER > 0x00907000L
059ec3d9 2030
8b417f2c 2031 /* This bit of code is now the version supplied by Lars Mainka. (I have
10a831a3 2032 merely reformatted it into the Exim code style.)
8b417f2c 2033
10a831a3
JH
2034 "From here I changed the code to add support for multiple crl's
2035 in pem format in one file or to support hashed directory entries in
2036 pem format instead of a file. This method now uses the library function
2037 X509_STORE_load_locations to add the CRL location to the SSL context.
2038 OpenSSL will then handle the verify against CA certs and CRLs by
2039 itself in the verify callback." */
8b417f2c 2040
cf0c6164 2041 if (!expand_check(crl, US"tls_crl", &expcrl, errstr)) return DEFER;
10a831a3 2042 if (expcrl && *expcrl)
059ec3d9 2043 {
8b417f2c
PH
2044 struct stat statbufcrl;
2045 if (Ustat(expcrl, &statbufcrl) < 0)
2046 {
2047 log_write(0, LOG_MAIN|LOG_PANIC,
2048 "failed to stat %s for certificates revocation lists", expcrl);
2049 return DEFER;
2050 }
2051 else
059ec3d9 2052 {
8b417f2c
PH
2053 /* is it a file or directory? */
2054 uschar *file, *dir;
7be682ca 2055 X509_STORE *cvstore = SSL_CTX_get_cert_store(sctx);
8b417f2c 2056 if ((statbufcrl.st_mode & S_IFMT) == S_IFDIR)
059ec3d9 2057 {
8b417f2c
PH
2058 file = NULL;
2059 dir = expcrl;
2060 DEBUG(D_tls) debug_printf("SSL CRL value is a directory %s\n", dir);
059ec3d9
PH
2061 }
2062 else
2063 {
8b417f2c
PH
2064 file = expcrl;
2065 dir = NULL;
2066 DEBUG(D_tls) debug_printf("SSL CRL value is a file %s\n", file);
059ec3d9 2067 }
8b417f2c 2068 if (X509_STORE_load_locations(cvstore, CS file, CS dir) == 0)
cf0c6164 2069 return tls_error(US"X509_STORE_load_locations", host, NULL, errstr);
8b417f2c
PH
2070
2071 /* setting the flags to check against the complete crl chain */
2072
2073 X509_STORE_set_flags(cvstore,
2074 X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL);
059ec3d9 2075 }
059ec3d9
PH
2076 }
2077
10a831a3 2078#endif /* OPENSSL_VERSION_NUMBER > 0x00907000L */
059ec3d9
PH
2079
2080 /* If verification is optional, don't fail if no certificate */
2081
7be682ca 2082 SSL_CTX_set_verify(sctx,
059ec3d9 2083 SSL_VERIFY_PEER | (optional? 0 : SSL_VERIFY_FAIL_IF_NO_PEER_CERT),
983207c1 2084 cert_vfy_cb);
059ec3d9
PH
2085 }
2086
2087return OK;
2088}
2089
2090
2091
2092/*************************************************
2093* Start a TLS session in a server *
2094*************************************************/
2095
2096/* This is called when Exim is running as a server, after having received
2097the STARTTLS command. It must respond to that command, and then negotiate
2098a TLS session.
2099
2100Arguments:
2101 require_ciphers allowed ciphers
cf0c6164 2102 errstr pointer to error message
059ec3d9
PH
2103
2104Returns: OK on success
2105 DEFER for errors before the start of the negotiation
4c04137d 2106 FAIL for errors during the negotiation; the server can't
059ec3d9
PH
2107 continue running.
2108*/
2109
2110int
cf0c6164 2111tls_server_start(const uschar * require_ciphers, uschar ** errstr)
059ec3d9
PH
2112{
2113int rc;
cf0c6164
JH
2114uschar * expciphers;
2115tls_ext_ctx_cb * cbinfo;
f69979cf 2116static uschar peerdn[256];
817d9f57 2117static uschar cipherbuf[256];
059ec3d9
PH
2118
2119/* Check for previous activation */
2120
74f1a423 2121if (tls_in.active.sock >= 0)
059ec3d9 2122 {
cf0c6164 2123 tls_error(US"STARTTLS received after TLS started", NULL, US"", errstr);
925ac8e4 2124 smtp_printf("554 Already in TLS\r\n", FALSE);
059ec3d9
PH
2125 return FAIL;
2126 }
2127
2128/* Initialize the SSL library. If it fails, it will already have logged
2129the error. */
2130
817d9f57 2131rc = tls_init(&server_ctx, NULL, tls_dhparam, tls_certificate, tls_privatekey,
f2de3a33 2132#ifndef DISABLE_OCSP
47195144 2133 tls_ocsp_file, /*XXX stack*/
3f7eeb86 2134#endif
cf0c6164 2135 NULL, &server_static_cbinfo, errstr);
059ec3d9 2136if (rc != OK) return rc;
817d9f57 2137cbinfo = server_static_cbinfo;
059ec3d9 2138
cf0c6164 2139if (!expand_check(require_ciphers, US"tls_require_ciphers", &expciphers, errstr))
059ec3d9
PH
2140 return FAIL;
2141
2142/* In OpenSSL, cipher components are separated by hyphens. In GnuTLS, they
17c76198
PP
2143were historically separated by underscores. So that I can use either form in my
2144tests, and also for general convenience, we turn underscores into hyphens here.
0c3807a8
JH
2145
2146XXX SSL_CTX_set_cipher_list() is replaced by SSL_CTX_set_ciphersuites()
2147for TLS 1.3 . Since we do not call it at present we get the default list:
2148TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256
17c76198 2149*/
059ec3d9 2150
c3033f13 2151if (expciphers)
059ec3d9 2152 {
c3033f13 2153 uschar * s = expciphers;
059ec3d9
PH
2154 while (*s != 0) { if (*s == '_') *s = '-'; s++; }
2155 DEBUG(D_tls) debug_printf("required ciphers: %s\n", expciphers);
817d9f57 2156 if (!SSL_CTX_set_cipher_list(server_ctx, CS expciphers))
cf0c6164 2157 return tls_error(US"SSL_CTX_set_cipher_list", NULL, NULL, errstr);
7be682ca 2158 cbinfo->server_cipher_list = expciphers;
059ec3d9
PH
2159 }
2160
2161/* If this is a host for which certificate verification is mandatory or
2162optional, set up appropriately. */
2163
817d9f57 2164tls_in.certificate_verified = FALSE;
c0635b6d 2165#ifdef SUPPORT_DANE
53a7196b
JH
2166tls_in.dane_verified = FALSE;
2167#endif
a2ff477a 2168server_verify_callback_called = FALSE;
059ec3d9
PH
2169
2170if (verify_check_host(&tls_verify_hosts) == OK)
2171 {
983207c1 2172 rc = setup_certs(server_ctx, tls_verify_certificates, tls_crl, NULL,
afdb5e9c 2173 FALSE, verify_callback_server, errstr);
059ec3d9 2174 if (rc != OK) return rc;
a2ff477a 2175 server_verify_optional = FALSE;
059ec3d9
PH
2176 }
2177else if (verify_check_host(&tls_try_verify_hosts) == OK)
2178 {
983207c1 2179 rc = setup_certs(server_ctx, tls_verify_certificates, tls_crl, NULL,
afdb5e9c 2180 TRUE, verify_callback_server, errstr);
059ec3d9 2181 if (rc != OK) return rc;
a2ff477a 2182 server_verify_optional = TRUE;
059ec3d9
PH
2183 }
2184
2185/* Prepare for new connection */
2186
cf0c6164
JH
2187if (!(server_ssl = SSL_new(server_ctx)))
2188 return tls_error(US"SSL_new", NULL, NULL, errstr);
da3ad30d
PP
2189
2190/* Warning: we used to SSL_clear(ssl) here, it was removed.
2191 *
2192 * With the SSL_clear(), we get strange interoperability bugs with
2193 * OpenSSL 1.0.1b and TLS1.1/1.2. It looks as though this may be a bug in
2194 * OpenSSL itself, as a clear should not lead to inability to follow protocols.
2195 *
2196 * The SSL_clear() call is to let an existing SSL* be reused, typically after
2197 * session shutdown. In this case, we have a brand new object and there's no
2198 * obvious reason to immediately clear it. I'm guessing that this was
2199 * originally added because of incomplete initialisation which the clear fixed,
2200 * in some historic release.
2201 */
059ec3d9
PH
2202
2203/* Set context and tell client to go ahead, except in the case of TLS startup
2204on connection, where outputting anything now upsets the clients and tends to
2205make them disconnect. We need to have an explicit fflush() here, to force out
2206the response. Other smtp_printf() calls do not need it, because in non-TLS
2207mode, the fflush() happens when smtp_getc() is called. */
2208
817d9f57
JH
2209SSL_set_session_id_context(server_ssl, sid_ctx, Ustrlen(sid_ctx));
2210if (!tls_in.on_connect)
059ec3d9 2211 {
925ac8e4 2212 smtp_printf("220 TLS go ahead\r\n", FALSE);
059ec3d9
PH
2213 fflush(smtp_out);
2214 }
2215
2216/* Now negotiate the TLS session. We put our own timer on it, since it seems
2217that the OpenSSL library doesn't. */
2218
817d9f57
JH
2219SSL_set_wfd(server_ssl, fileno(smtp_out));
2220SSL_set_rfd(server_ssl, fileno(smtp_in));
2221SSL_set_accept_state(server_ssl);
059ec3d9
PH
2222
2223DEBUG(D_tls) debug_printf("Calling SSL_accept\n");
2224
2225sigalrm_seen = FALSE;
2226if (smtp_receive_timeout > 0) alarm(smtp_receive_timeout);
817d9f57 2227rc = SSL_accept(server_ssl);
059ec3d9
PH
2228alarm(0);
2229
2230if (rc <= 0)
2231 {
cf0c6164 2232 (void) tls_error(US"SSL_accept", NULL, sigalrm_seen ? US"timed out" : NULL, errstr);
059ec3d9
PH
2233 return FAIL;
2234 }
2235
2236DEBUG(D_tls) debug_printf("SSL_accept was successful\n");
2237
2238/* TLS has been set up. Adjust the input functions to read via TLS,
2239and initialize things. */
2240
f69979cf
JH
2241peer_cert(server_ssl, &tls_in, peerdn, sizeof(peerdn));
2242
817d9f57
JH
2243construct_cipher_name(server_ssl, cipherbuf, sizeof(cipherbuf), &tls_in.bits);
2244tls_in.cipher = cipherbuf;
059ec3d9
PH
2245
2246DEBUG(D_tls)
2247 {
2248 uschar buf[2048];
817d9f57 2249 if (SSL_get_shared_ciphers(server_ssl, CS buf, sizeof(buf)) != NULL)
059ec3d9
PH
2250 debug_printf("Shared ciphers: %s\n", buf);
2251 }
2252
9d1c15ef
JH
2253/* Record the certificate we presented */
2254 {
2255 X509 * crt = SSL_get_certificate(server_ssl);
2256 tls_in.ourcert = crt ? X509_dup(crt) : NULL;
2257 }
059ec3d9 2258
817d9f57
JH
2259/* Only used by the server-side tls (tls_in), including tls_getc.
2260 Client-side (tls_out) reads (seem to?) go via
2261 smtp_read_response()/ip_recv().
2262 Hence no need to duplicate for _in and _out.
2263 */
b808677c 2264if (!ssl_xfer_buffer) ssl_xfer_buffer = store_malloc(ssl_xfer_buffer_size);
059ec3d9 2265ssl_xfer_buffer_lwm = ssl_xfer_buffer_hwm = 0;
8b77d27a 2266ssl_xfer_eof = ssl_xfer_error = FALSE;
059ec3d9
PH
2267
2268receive_getc = tls_getc;
0d81dabc 2269receive_getbuf = tls_getbuf;
584e96c6 2270receive_get_cache = tls_get_cache;
059ec3d9
PH
2271receive_ungetc = tls_ungetc;
2272receive_feof = tls_feof;
2273receive_ferror = tls_ferror;
58eb016e 2274receive_smtp_buffered = tls_smtp_buffered;
059ec3d9 2275
74f1a423
JH
2276tls_in.active.sock = fileno(smtp_out);
2277tls_in.active.tls_ctx = NULL; /* not using explicit ctx for server-side */
059ec3d9
PH
2278return OK;
2279}
2280
2281
2282
2283
043b1248
JH
2284static int
2285tls_client_basic_ctx_init(SSL_CTX * ctx,
cf0c6164
JH
2286 host_item * host, smtp_transport_options_block * ob, tls_ext_ctx_cb * cbinfo,
2287 uschar ** errstr)
043b1248
JH
2288{
2289int rc;
94431adb 2290/* stick to the old behaviour for compatibility if tls_verify_certificates is
043b1248
JH
2291 set but both tls_verify_hosts and tls_try_verify_hosts is not set. Check only
2292 the specified host patterns if one of them is defined */
2293
610ff438
JH
2294if ( ( !ob->tls_verify_hosts
2295 && (!ob->tls_try_verify_hosts || !*ob->tls_try_verify_hosts)
2296 )
3c07dd2d 2297 || verify_check_given_host(CUSS &ob->tls_verify_hosts, host) == OK
aa2a70ba 2298 )
043b1248 2299 client_verify_optional = FALSE;
3c07dd2d 2300else if (verify_check_given_host(CUSS &ob->tls_try_verify_hosts, host) == OK)
aa2a70ba
JH
2301 client_verify_optional = TRUE;
2302else
2303 return OK;
2304
2305if ((rc = setup_certs(ctx, ob->tls_verify_certificates,
cf0c6164
JH
2306 ob->tls_crl, host, client_verify_optional, verify_callback_client,
2307 errstr)) != OK)
aa2a70ba 2308 return rc;
043b1248 2309
3c07dd2d 2310if (verify_check_given_host(CUSS &ob->tls_verify_cert_hostnames, host) == OK)
043b1248 2311 {
4af0d74a 2312 cbinfo->verify_cert_hostnames =
8c5d388a 2313#ifdef SUPPORT_I18N
4af0d74a
JH
2314 string_domain_utf8_to_alabel(host->name, NULL);
2315#else
2316 host->name;
2317#endif
aa2a70ba
JH
2318 DEBUG(D_tls) debug_printf("Cert hostname to check: \"%s\"\n",
2319 cbinfo->verify_cert_hostnames);
043b1248 2320 }
043b1248
JH
2321return OK;
2322}
059ec3d9 2323
fde080a4 2324
c0635b6d 2325#ifdef SUPPORT_DANE
fde080a4 2326static int
cf0c6164 2327dane_tlsa_load(SSL * ssl, host_item * host, dns_answer * dnsa, uschar ** errstr)
fde080a4
JH
2328{
2329dns_record * rr;
2330dns_scan dnss;
2331const char * hostnames[2] = { CS host->name, NULL };
2332int found = 0;
2333
2334if (DANESSL_init(ssl, NULL, hostnames) != 1)
cf0c6164 2335 return tls_error(US"hostnames load", host, NULL, errstr);
fde080a4
JH
2336
2337for (rr = dns_next_rr(dnsa, &dnss, RESET_ANSWERS);
2338 rr;
2339 rr = dns_next_rr(dnsa, &dnss, RESET_NEXT)
2340 ) if (rr->type == T_TLSA)
2341 {
c3033f13 2342 const uschar * p = rr->data;
fde080a4
JH
2343 uint8_t usage, selector, mtype;
2344 const char * mdname;
2345
fde080a4 2346 usage = *p++;
133d2546
JH
2347
2348 /* Only DANE-TA(2) and DANE-EE(3) are supported */
2349 if (usage != 2 && usage != 3) continue;
2350
fde080a4
JH
2351 selector = *p++;
2352 mtype = *p++;
2353
2354 switch (mtype)
2355 {
133d2546
JH
2356 default: continue; /* Only match-types 0, 1, 2 are supported */
2357 case 0: mdname = NULL; break;
2358 case 1: mdname = "sha256"; break;
2359 case 2: mdname = "sha512"; break;
fde080a4
JH
2360 }
2361
133d2546 2362 found++;
fde080a4
JH
2363 switch (DANESSL_add_tlsa(ssl, usage, selector, mdname, p, rr->size - 3))
2364 {
2365 default:
cf0c6164 2366 return tls_error(US"tlsa load", host, NULL, errstr);
c035b645 2367 case 0: /* action not taken */
fde080a4
JH
2368 case 1: break;
2369 }
594706ea
JH
2370
2371 tls_out.tlsa_usage |= 1<<usage;
fde080a4
JH
2372 }
2373
2374if (found)
2375 return OK;
2376
133d2546 2377log_write(0, LOG_MAIN, "DANE error: No usable TLSA records");
6ebd79ec 2378return DEFER;
fde080a4 2379}
c0635b6d 2380#endif /*SUPPORT_DANE*/
fde080a4
JH
2381
2382
2383
059ec3d9
PH
2384/*************************************************
2385* Start a TLS session in a client *
2386*************************************************/
2387
2388/* Called from the smtp transport after STARTTLS has been accepted.
2389
2390Argument:
2391 fd the fd of the connection
afdb5e9c
JH
2392 host connected host (for messages and option-tests)
2393 addr the first address (for some randomness; can be NULL)
a7538db1 2394 tb transport (always smtp)
0e66b3b6 2395 tlsa_dnsa tlsa lookup, if DANE, else null
afdb5e9c 2396 tlsp record details of channel configuration here; must be non-NULL
cf0c6164 2397 errstr error string pointer
059ec3d9 2398
74f1a423 2399Returns: Pointer to TLS session context, or NULL on error
059ec3d9
PH
2400*/
2401
74f1a423 2402void *
f5d78688 2403tls_client_start(int fd, host_item *host, address_item *addr,
cf0c6164 2404 transport_instance * tb,
c0635b6d 2405#ifdef SUPPORT_DANE
cf0c6164 2406 dns_answer * tlsa_dnsa,
0e66b3b6 2407#endif
74f1a423 2408 tls_support * tlsp, uschar ** errstr)
059ec3d9 2409{
afdb5e9c
JH
2410smtp_transport_options_block * ob = tb
2411 ? (smtp_transport_options_block *)tb->options_block
2412 : &smtp_transport_option_defaults;
74f1a423 2413exim_openssl_client_tls_ctx * exim_client_ctx;
f69979cf 2414static uschar peerdn[256];
868f5672 2415uschar * expciphers;
059ec3d9 2416int rc;
817d9f57 2417static uschar cipherbuf[256];
043b1248
JH
2418
2419#ifndef DISABLE_OCSP
043b1248 2420BOOL request_ocsp = FALSE;
6634ac8d 2421BOOL require_ocsp = FALSE;
043b1248 2422#endif
043b1248 2423
74f1a423
JH
2424rc = store_pool;
2425store_pool = POOL_PERM;
2426exim_client_ctx = store_get(sizeof(exim_openssl_client_tls_ctx));
2427store_pool = rc;
2428
c0635b6d 2429#ifdef SUPPORT_DANE
74f1a423 2430tlsp->tlsa_usage = 0;
043b1248
JH
2431#endif
2432
f2de3a33 2433#ifndef DISABLE_OCSP
043b1248 2434 {
c0635b6d 2435# ifdef SUPPORT_DANE
4f59c424
JH
2436 if ( tlsa_dnsa
2437 && ob->hosts_request_ocsp[0] == '*'
2438 && ob->hosts_request_ocsp[1] == '\0'
2439 )
2440 {
2441 /* Unchanged from default. Use a safer one under DANE */
2442 request_ocsp = TRUE;
2443 ob->hosts_request_ocsp = US"${if or { {= {0}{$tls_out_tlsa_usage}} "
2444 " {= {4}{$tls_out_tlsa_usage}} } "
2445 " {*}{}}";
2446 }
2447# endif
2448
5130845b 2449 if ((require_ocsp =
3c07dd2d 2450 verify_check_given_host(CUSS &ob->hosts_require_ocsp, host) == OK))
fca41d5a
JH
2451 request_ocsp = TRUE;
2452 else
c0635b6d 2453# ifdef SUPPORT_DANE
4f59c424 2454 if (!request_ocsp)
fca41d5a 2455# endif
5130845b 2456 request_ocsp =
3c07dd2d 2457 verify_check_given_host(CUSS &ob->hosts_request_ocsp, host) == OK;
043b1248 2458 }
f5d78688 2459#endif
059ec3d9 2460
74f1a423 2461rc = tls_init(&exim_client_ctx->ctx, host, NULL,
65867078 2462 ob->tls_certificate, ob->tls_privatekey,
f2de3a33 2463#ifndef DISABLE_OCSP
44662487 2464 (void *)(long)request_ocsp,
3f7eeb86 2465#endif
cf0c6164 2466 addr, &client_static_cbinfo, errstr);
74f1a423 2467if (rc != OK) return NULL;
059ec3d9 2468
74f1a423 2469tlsp->certificate_verified = FALSE;
a2ff477a 2470client_verify_callback_called = FALSE;
059ec3d9 2471
5ec37a55
PP
2472expciphers = NULL;
2473#ifdef SUPPORT_DANE
2474if (tlsa_dnsa)
2475 {
2476 /* We fall back to tls_require_ciphers if unset, empty or forced failure, but
2477 other failures should be treated as problems. */
2478 if (ob->dane_require_tls_ciphers &&
2479 !expand_check(ob->dane_require_tls_ciphers, US"dane_require_tls_ciphers",
2480 &expciphers, errstr))
74f1a423 2481 return NULL;
5ec37a55
PP
2482 if (expciphers && *expciphers == '\0')
2483 expciphers = NULL;
2484 }
2485#endif
2486if (!expciphers &&
2487 !expand_check(ob->tls_require_ciphers, US"tls_require_ciphers",
2488 &expciphers, errstr))
74f1a423 2489 return NULL;
059ec3d9
PH
2490
2491/* In OpenSSL, cipher components are separated by hyphens. In GnuTLS, they
2492are separated by underscores. So that I can use either form in my tests, and
2493also for general convenience, we turn underscores into hyphens here. */
2494
cf0c6164 2495if (expciphers)
059ec3d9
PH
2496 {
2497 uschar *s = expciphers;
cf0c6164 2498 while (*s) { if (*s == '_') *s = '-'; s++; }
059ec3d9 2499 DEBUG(D_tls) debug_printf("required ciphers: %s\n", expciphers);
74f1a423
JH
2500 if (!SSL_CTX_set_cipher_list(exim_client_ctx->ctx, CS expciphers))
2501 {
2502 tls_error(US"SSL_CTX_set_cipher_list", host, NULL, errstr);
2503 return NULL;
2504 }
059ec3d9
PH
2505 }
2506
c0635b6d 2507#ifdef SUPPORT_DANE
0e66b3b6 2508if (tlsa_dnsa)
a63be306 2509 {
74f1a423 2510 SSL_CTX_set_verify(exim_client_ctx->ctx,
02af313d
JH
2511 SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT,
2512 verify_callback_client_dane);
e5cccda9 2513
043b1248 2514 if (!DANESSL_library_init())
74f1a423
JH
2515 {
2516 tls_error(US"library init", host, NULL, errstr);
2517 return NULL;
2518 }
2519 if (DANESSL_CTX_init(exim_client_ctx->ctx) <= 0)
2520 {
2521 tls_error(US"context init", host, NULL, errstr);
2522 return NULL;
2523 }
043b1248
JH
2524 }
2525else
e51c7be2 2526
043b1248
JH
2527#endif
2528
74f1a423
JH
2529 if (tls_client_basic_ctx_init(exim_client_ctx->ctx, host, ob,
2530 client_static_cbinfo, errstr) != OK)
2531 return NULL;
059ec3d9 2532
74f1a423
JH
2533if (!(exim_client_ctx->ssl = SSL_new(exim_client_ctx->ctx)))
2534 {
2535 tls_error(US"SSL_new", host, NULL, errstr);
2536 return NULL;
2537 }
2538SSL_set_session_id_context(exim_client_ctx->ssl, sid_ctx, Ustrlen(sid_ctx));
2539SSL_set_fd(exim_client_ctx->ssl, fd);
2540SSL_set_connect_state(exim_client_ctx->ssl);
059ec3d9 2541
65867078 2542if (ob->tls_sni)
3f0945ff 2543 {
74f1a423
JH
2544 if (!expand_check(ob->tls_sni, US"tls_sni", &tlsp->sni, errstr))
2545 return NULL;
2546 if (!tlsp->sni)
2c9a0e86
PP
2547 {
2548 DEBUG(D_tls) debug_printf("Setting TLS SNI forced to fail, not sending\n");
2549 }
74f1a423
JH
2550 else if (!Ustrlen(tlsp->sni))
2551 tlsp->sni = NULL;
3f0945ff
PP
2552 else
2553 {
35731706 2554#ifdef EXIM_HAVE_OPENSSL_TLSEXT
74f1a423
JH
2555 DEBUG(D_tls) debug_printf("Setting TLS SNI \"%s\"\n", tlsp->sni);
2556 SSL_set_tlsext_host_name(exim_client_ctx->ssl, tlsp->sni);
35731706 2557#else
66802652 2558 log_write(0, LOG_MAIN, "SNI unusable with this OpenSSL library version; ignoring \"%s\"\n",
74f1a423 2559 tlsp->sni);
35731706 2560#endif
3f0945ff
PP
2561 }
2562 }
2563
c0635b6d 2564#ifdef SUPPORT_DANE
0e66b3b6 2565if (tlsa_dnsa)
74f1a423
JH
2566 if (dane_tlsa_load(exim_client_ctx->ssl, host, tlsa_dnsa, errstr) != OK)
2567 return NULL;
594706ea
JH
2568#endif
2569
f2de3a33 2570#ifndef DISABLE_OCSP
f5d78688
JH
2571/* Request certificate status at connection-time. If the server
2572does OCSP stapling we will get the callback (set in tls_init()) */
c0635b6d 2573# ifdef SUPPORT_DANE
594706ea
JH
2574if (request_ocsp)
2575 {
2576 const uschar * s;
41afb5cb
JH
2577 if ( ((s = ob->hosts_require_ocsp) && Ustrstr(s, US"tls_out_tlsa_usage"))
2578 || ((s = ob->hosts_request_ocsp) && Ustrstr(s, US"tls_out_tlsa_usage"))
594706ea
JH
2579 )
2580 { /* Re-eval now $tls_out_tlsa_usage is populated. If
2581 this means we avoid the OCSP request, we wasted the setup
2582 cost in tls_init(). */
3c07dd2d 2583 require_ocsp = verify_check_given_host(CUSS &ob->hosts_require_ocsp, host) == OK;
5130845b 2584 request_ocsp = require_ocsp
3c07dd2d 2585 || verify_check_given_host(CUSS &ob->hosts_request_ocsp, host) == OK;
594706ea
JH
2586 }
2587 }
b50c8b84
JH
2588# endif
2589
44662487
JH
2590if (request_ocsp)
2591 {
74f1a423 2592 SSL_set_tlsext_status_type(exim_client_ctx->ssl, TLSEXT_STATUSTYPE_ocsp);
44662487 2593 client_static_cbinfo->u_ocsp.client.verify_required = require_ocsp;
74f1a423 2594 tlsp->ocsp = OCSP_NOT_RESP;
44662487 2595 }
f5d78688
JH
2596#endif
2597
0cbf2b82 2598#ifndef DISABLE_EVENT
afdb5e9c 2599client_static_cbinfo->event_action = tb ? tb->event_action : NULL;
a7538db1 2600#endif
043b1248 2601
059ec3d9
PH
2602/* There doesn't seem to be a built-in timeout on connection. */
2603
2604DEBUG(D_tls) debug_printf("Calling SSL_connect\n");
2605sigalrm_seen = FALSE;
65867078 2606alarm(ob->command_timeout);
74f1a423 2607rc = SSL_connect(exim_client_ctx->ssl);
059ec3d9
PH
2608alarm(0);
2609
c0635b6d 2610#ifdef SUPPORT_DANE
0e66b3b6 2611if (tlsa_dnsa)
74f1a423 2612 DANESSL_cleanup(exim_client_ctx->ssl);
043b1248
JH
2613#endif
2614
059ec3d9 2615if (rc <= 0)
74f1a423
JH
2616 {
2617 tls_error(US"SSL_connect", host, sigalrm_seen ? US"timed out" : NULL, errstr);
2618 return NULL;
2619 }
059ec3d9
PH
2620
2621DEBUG(D_tls) debug_printf("SSL_connect succeeded\n");
2622
74f1a423 2623peer_cert(exim_client_ctx->ssl, tlsp, peerdn, sizeof(peerdn));
059ec3d9 2624
74f1a423
JH
2625construct_cipher_name(exim_client_ctx->ssl, cipherbuf, sizeof(cipherbuf), &tlsp->bits);
2626tlsp->cipher = cipherbuf;
059ec3d9 2627
9d1c15ef
JH
2628/* Record the certificate we presented */
2629 {
74f1a423
JH
2630 X509 * crt = SSL_get_certificate(exim_client_ctx->ssl);
2631 tlsp->ourcert = crt ? X509_dup(crt) : NULL;
9d1c15ef
JH
2632 }
2633
74f1a423
JH
2634tlsp->active.sock = fd;
2635tlsp->active.tls_ctx = exim_client_ctx;
2636return exim_client_ctx;
059ec3d9
PH
2637}
2638
2639
2640
2641
2642
0d81dabc
JH
2643static BOOL
2644tls_refill(unsigned lim)
2645{
2646int error;
2647int inbytes;
2648
2649DEBUG(D_tls) debug_printf("Calling SSL_read(%p, %p, %u)\n", server_ssl,
2650 ssl_xfer_buffer, ssl_xfer_buffer_size);
2651
2652if (smtp_receive_timeout > 0) alarm(smtp_receive_timeout);
2653inbytes = SSL_read(server_ssl, CS ssl_xfer_buffer,
2654 MIN(ssl_xfer_buffer_size, lim));
2655error = SSL_get_error(server_ssl, inbytes);
9723f966
JH
2656if (smtp_receive_timeout > 0) alarm(0);
2657
2658if (had_command_timeout) /* set by signal handler */
2659 smtp_command_timeout_exit(); /* does not return */
2660if (had_command_sigterm)
2661 smtp_command_sigterm_exit();
2662if (had_data_timeout)
2663 smtp_data_timeout_exit();
2664if (had_data_sigint)
2665 smtp_data_sigint_exit();
0d81dabc
JH
2666
2667/* SSL_ERROR_ZERO_RETURN appears to mean that the SSL session has been
2668closed down, not that the socket itself has been closed down. Revert to
2669non-SSL handling. */
2670
74f1a423 2671switch(error)
0d81dabc 2672 {
74f1a423
JH
2673 case SSL_ERROR_NONE:
2674 break;
2675
2676 case SSL_ERROR_ZERO_RETURN:
2677 DEBUG(D_tls) debug_printf("Got SSL_ERROR_ZERO_RETURN\n");
0d81dabc 2678
74f1a423
JH
2679 receive_getc = smtp_getc;
2680 receive_getbuf = smtp_getbuf;
2681 receive_get_cache = smtp_get_cache;
2682 receive_ungetc = smtp_ungetc;
2683 receive_feof = smtp_feof;
2684 receive_ferror = smtp_ferror;
2685 receive_smtp_buffered = smtp_buffered;
0d81dabc 2686
74f1a423
JH
2687 if (SSL_get_shutdown(server_ssl) == SSL_RECEIVED_SHUTDOWN)
2688 SSL_shutdown(server_ssl);
dec766a1 2689
37f0ce65 2690#ifndef DISABLE_OCSP
74f1a423
JH
2691 sk_X509_pop_free(server_static_cbinfo->verify_stack, X509_free);
2692 server_static_cbinfo->verify_stack = NULL;
37f0ce65 2693#endif
74f1a423
JH
2694 SSL_free(server_ssl);
2695 SSL_CTX_free(server_ctx);
2696 server_ctx = NULL;
2697 server_ssl = NULL;
2698 tls_in.active.sock = -1;
2699 tls_in.active.tls_ctx = NULL;
2700 tls_in.bits = 0;
2701 tls_in.cipher = NULL;
2702 tls_in.peerdn = NULL;
2703 tls_in.sni = NULL;
0d81dabc 2704
74f1a423 2705 return FALSE;
0d81dabc 2706
74f1a423
JH
2707 /* Handle genuine errors */
2708 case SSL_ERROR_SSL:
2709 ERR_error_string(ERR_get_error(), ssl_errstring);
2710 log_write(0, LOG_MAIN, "TLS error (SSL_read): %s", ssl_errstring);
2711 ssl_xfer_error = TRUE;
2712 return FALSE;
0d81dabc 2713
74f1a423
JH
2714 default:
2715 DEBUG(D_tls) debug_printf("Got SSL error %d\n", error);
2716 DEBUG(D_tls) if (error == SSL_ERROR_SYSCALL)
2717 debug_printf(" - syscall %s\n", strerror(errno));
2718 ssl_xfer_error = TRUE;
2719 return FALSE;
0d81dabc
JH
2720 }
2721
2722#ifndef DISABLE_DKIM
2723dkim_exim_verify_feed(ssl_xfer_buffer, inbytes);
2724#endif
2725ssl_xfer_buffer_hwm = inbytes;
2726ssl_xfer_buffer_lwm = 0;
2727return TRUE;
2728}
2729
2730
059ec3d9
PH
2731/*************************************************
2732* TLS version of getc *
2733*************************************************/
2734
2735/* This gets the next byte from the TLS input buffer. If the buffer is empty,
2736it refills the buffer via the SSL reading function.
2737
bd8fbe36 2738Arguments: lim Maximum amount to read/buffer
059ec3d9 2739Returns: the next character or EOF
817d9f57
JH
2740
2741Only used by the server-side TLS.
059ec3d9
PH
2742*/
2743
2744int
bd8fbe36 2745tls_getc(unsigned lim)
059ec3d9
PH
2746{
2747if (ssl_xfer_buffer_lwm >= ssl_xfer_buffer_hwm)
0d81dabc
JH
2748 if (!tls_refill(lim))
2749 return ssl_xfer_error ? EOF : smtp_getc(lim);
059ec3d9 2750
0d81dabc 2751/* Something in the buffer; return next uschar */
059ec3d9 2752
0d81dabc
JH
2753return ssl_xfer_buffer[ssl_xfer_buffer_lwm++];
2754}
059ec3d9 2755
0d81dabc
JH
2756uschar *
2757tls_getbuf(unsigned * len)
2758{
2759unsigned size;
2760uschar * buf;
ba084640 2761
0d81dabc
JH
2762if (ssl_xfer_buffer_lwm >= ssl_xfer_buffer_hwm)
2763 if (!tls_refill(*len))
059ec3d9 2764 {
0d81dabc
JH
2765 if (!ssl_xfer_error) return smtp_getbuf(len);
2766 *len = 0;
2767 return NULL;
059ec3d9 2768 }
c80c5570 2769
0d81dabc
JH
2770if ((size = ssl_xfer_buffer_hwm - ssl_xfer_buffer_lwm) > *len)
2771 size = *len;
2772buf = &ssl_xfer_buffer[ssl_xfer_buffer_lwm];
2773ssl_xfer_buffer_lwm += size;
2774*len = size;
2775return buf;
059ec3d9
PH
2776}
2777
0d81dabc 2778
584e96c6
JH
2779void
2780tls_get_cache()
2781{
9960d1e5 2782#ifndef DISABLE_DKIM
584e96c6
JH
2783int n = ssl_xfer_buffer_hwm - ssl_xfer_buffer_lwm;
2784if (n > 0)
2785 dkim_exim_verify_feed(ssl_xfer_buffer+ssl_xfer_buffer_lwm, n);
584e96c6 2786#endif
9960d1e5 2787}
584e96c6 2788
059ec3d9 2789
925ac8e4
JH
2790BOOL
2791tls_could_read(void)
2792{
a5ffa9b4 2793return ssl_xfer_buffer_lwm < ssl_xfer_buffer_hwm || SSL_pending(server_ssl) > 0;
925ac8e4
JH
2794}
2795
059ec3d9
PH
2796
2797/*************************************************
2798* Read bytes from TLS channel *
2799*************************************************/
2800
2801/*
2802Arguments:
74f1a423 2803 ct_ctx client context pointer, or NULL for the one global server context
059ec3d9
PH
2804 buff buffer of data
2805 len size of buffer
2806
2807Returns: the number of bytes read
afdb5e9c 2808 -1 after a failed read, including EOF
817d9f57
JH
2809
2810Only used by the client-side TLS.
059ec3d9
PH
2811*/
2812
2813int
74f1a423 2814tls_read(void * ct_ctx, uschar *buff, size_t len)
059ec3d9 2815{
74f1a423 2816SSL * ssl = ct_ctx ? ((exim_openssl_client_tls_ctx *)ct_ctx)->ssl : server_ssl;
059ec3d9
PH
2817int inbytes;
2818int error;
2819
389ca47a 2820DEBUG(D_tls) debug_printf("Calling SSL_read(%p, %p, %u)\n", ssl,
c80c5570 2821 buff, (unsigned int)len);
059ec3d9 2822
389ca47a
JH
2823inbytes = SSL_read(ssl, CS buff, len);
2824error = SSL_get_error(ssl, inbytes);
059ec3d9
PH
2825
2826if (error == SSL_ERROR_ZERO_RETURN)
2827 {
2828 DEBUG(D_tls) debug_printf("Got SSL_ERROR_ZERO_RETURN\n");
2829 return -1;
2830 }
2831else if (error != SSL_ERROR_NONE)
059ec3d9 2832 return -1;
059ec3d9
PH
2833
2834return inbytes;
2835}
2836
2837
2838
2839
2840
2841/*************************************************
2842* Write bytes down TLS channel *
2843*************************************************/
2844
2845/*
2846Arguments:
74f1a423 2847 ct_ctx client context pointer, or NULL for the one global server context
059ec3d9
PH
2848 buff buffer of data
2849 len number of bytes
925ac8e4 2850 more further data expected soon
059ec3d9
PH
2851
2852Returns: the number of bytes after a successful write,
2853 -1 after a failed write
817d9f57
JH
2854
2855Used by both server-side and client-side TLS.
059ec3d9
PH
2856*/
2857
2858int
74f1a423 2859tls_write(void * ct_ctx, const uschar *buff, size_t len, BOOL more)
059ec3d9 2860{
a5ffa9b4 2861int outbytes, error, left;
74f1a423 2862SSL * ssl = ct_ctx ? ((exim_openssl_client_tls_ctx *)ct_ctx)->ssl : server_ssl;
acec9514 2863static gstring * corked = NULL;
a5ffa9b4 2864
ef698bf6 2865DEBUG(D_tls) debug_printf("%s(%p, %lu%s)\n", __FUNCTION__,
b93be52e 2866 buff, (unsigned long)len, more ? ", more" : "");
a5ffa9b4
JH
2867
2868/* Lacking a CORK or MSG_MORE facility (such as GnuTLS has) we copy data when
2869"more" is notified. This hack is only ok if small amounts are involved AND only
2870one stream does it, in one context (i.e. no store reset). Currently it is used
2871for the responses to the received SMTP MAIL , RCPT, DATA sequence, only. */
2872
74f1a423 2873if (!ct_ctx && (more || corked))
a5ffa9b4 2874 {
acec9514 2875 corked = string_catn(corked, buff, len);
a5ffa9b4
JH
2876 if (more)
2877 return len;
acec9514
JH
2878 buff = CUS corked->s;
2879 len = corked->ptr;
2880 corked = NULL;
a5ffa9b4 2881 }
059ec3d9 2882
a5ffa9b4 2883for (left = len; left > 0;)
059ec3d9 2884 {
74f1a423 2885 DEBUG(D_tls) debug_printf("SSL_write(%p, %p, %d)\n", ssl, buff, left);
059ec3d9
PH
2886 outbytes = SSL_write(ssl, CS buff, left);
2887 error = SSL_get_error(ssl, outbytes);
2888 DEBUG(D_tls) debug_printf("outbytes=%d error=%d\n", outbytes, error);
2889 switch (error)
2890 {
2891 case SSL_ERROR_SSL:
96f5fe4c
JH
2892 ERR_error_string(ERR_get_error(), ssl_errstring);
2893 log_write(0, LOG_MAIN, "TLS error (SSL_write): %s", ssl_errstring);
2894 return -1;
059ec3d9
PH
2895
2896 case SSL_ERROR_NONE:
96f5fe4c
JH
2897 left -= outbytes;
2898 buff += outbytes;
2899 break;
059ec3d9
PH
2900
2901 case SSL_ERROR_ZERO_RETURN:
96f5fe4c
JH
2902 log_write(0, LOG_MAIN, "SSL channel closed on write");
2903 return -1;
059ec3d9 2904
817d9f57 2905 case SSL_ERROR_SYSCALL:
96f5fe4c
JH
2906 log_write(0, LOG_MAIN, "SSL_write: (from %s) syscall: %s",
2907 sender_fullhost ? sender_fullhost : US"<unknown>",
2908 strerror(errno));
2909 return -1;
817d9f57 2910
059ec3d9 2911 default:
96f5fe4c
JH
2912 log_write(0, LOG_MAIN, "SSL_write error %d", error);
2913 return -1;
059ec3d9
PH
2914 }
2915 }
2916return len;
2917}
2918
2919
2920
2921/*************************************************
2922* Close down a TLS session *
2923*************************************************/
2924
2925/* This is also called from within a delivery subprocess forked from the
2926daemon, to shut down the TLS library, without actually doing a shutdown (which
2927would tamper with the SSL session in the parent process).
2928
dec766a1 2929Arguments:
74f1a423 2930 ct_ctx client TLS context pointer, or NULL for the one global server context
dec766a1
WB
2931 shutdown 1 if TLS close-alert is to be sent,
2932 2 if also response to be waited for
2933
059ec3d9 2934Returns: nothing
817d9f57
JH
2935
2936Used by both server-side and client-side TLS.
059ec3d9
PH
2937*/
2938
2939void
74f1a423 2940tls_close(void * ct_ctx, int shutdown)
059ec3d9 2941{
74f1a423
JH
2942exim_openssl_client_tls_ctx * o_ctx = ct_ctx;
2943SSL_CTX **ctxp = o_ctx ? &o_ctx->ctx : &server_ctx;
2944SSL **sslp = o_ctx ? &o_ctx->ssl : &server_ssl;
2945int *fdp = o_ctx ? &tls_out.active.sock : &tls_in.active.sock;
817d9f57
JH
2946
2947if (*fdp < 0) return; /* TLS was not active */
059ec3d9
PH
2948
2949if (shutdown)
2950 {
dec766a1
WB
2951 int rc;
2952 DEBUG(D_tls) debug_printf("tls_close(): shutting down TLS%s\n",
2953 shutdown > 1 ? " (with response-wait)" : "");
2954
2955 if ( (rc = SSL_shutdown(*sslp)) == 0 /* send "close notify" alert */
2956 && shutdown > 1)
2957 {
2958 alarm(2);
2959 rc = SSL_shutdown(*sslp); /* wait for response */
2960 alarm(0);
2961 }
2962
2963 if (rc < 0) DEBUG(D_tls)
2964 {
2965 ERR_error_string(ERR_get_error(), ssl_errstring);
2966 debug_printf("SSL_shutdown: %s\n", ssl_errstring);
2967 }
2968 }
2969
37f0ce65 2970#ifndef DISABLE_OCSP
74f1a423 2971if (!o_ctx) /* server side */
dec766a1
WB
2972 {
2973 sk_X509_pop_free(server_static_cbinfo->verify_stack, X509_free);
dec766a1 2974 server_static_cbinfo->verify_stack = NULL;
059ec3d9 2975 }
37f0ce65 2976#endif
059ec3d9 2977
dec766a1 2978SSL_CTX_free(*ctxp);
817d9f57 2979SSL_free(*sslp);
dec766a1 2980*ctxp = NULL;
817d9f57 2981*sslp = NULL;
817d9f57 2982*fdp = -1;
059ec3d9
PH
2983}
2984
36f12725
NM
2985
2986
2987
3375e053
PP
2988/*************************************************
2989* Let tls_require_ciphers be checked at startup *
2990*************************************************/
2991
2992/* The tls_require_ciphers option, if set, must be something which the
2993library can parse.
2994
2995Returns: NULL on success, or error message
2996*/
2997
2998uschar *
2999tls_validate_require_cipher(void)
3000{
3001SSL_CTX *ctx;
3002uschar *s, *expciphers, *err;
3003
3004/* this duplicates from tls_init(), we need a better "init just global
3005state, for no specific purpose" singleton function of our own */
3006
3007SSL_load_error_strings();
3008OpenSSL_add_ssl_algorithms();
3009#if (OPENSSL_VERSION_NUMBER >= 0x0090800fL) && !defined(OPENSSL_NO_SHA256)
3010/* SHA256 is becoming ever more popular. This makes sure it gets added to the
3011list of available digests. */
3012EVP_add_digest(EVP_sha256());
3013#endif
3014
3015if (!(tls_require_ciphers && *tls_require_ciphers))
3016 return NULL;
3017
cf0c6164
JH
3018if (!expand_check(tls_require_ciphers, US"tls_require_ciphers", &expciphers,
3019 &err))
3375e053
PP
3020 return US"failed to expand tls_require_ciphers";
3021
3022if (!(expciphers && *expciphers))
3023 return NULL;
3024
3025/* normalisation ripped from above */
3026s = expciphers;
3027while (*s != 0) { if (*s == '_') *s = '-'; s++; }
3028
3029err = NULL;
3030
7a8b9519
JH
3031#ifdef EXIM_HAVE_OPENSSL_TLS_METHOD
3032if (!(ctx = SSL_CTX_new(TLS_server_method())))
3033#else
3034if (!(ctx = SSL_CTX_new(SSLv23_server_method())))
3035#endif
3375e053
PP
3036 {
3037 ERR_error_string(ERR_get_error(), ssl_errstring);
3038 return string_sprintf("SSL_CTX_new() failed: %s", ssl_errstring);
3039 }
3040
3041DEBUG(D_tls)
3042 debug_printf("tls_require_ciphers expands to \"%s\"\n", expciphers);
3043
3044if (!SSL_CTX_set_cipher_list(ctx, CS expciphers))
3045 {
3046 ERR_error_string(ERR_get_error(), ssl_errstring);
cf0c6164
JH
3047 err = string_sprintf("SSL_CTX_set_cipher_list(%s) failed: %s",
3048 expciphers, ssl_errstring);
3375e053
PP
3049 }
3050
3051SSL_CTX_free(ctx);
3052
3053return err;
3054}
3055
3056
3057
3058
36f12725
NM
3059/*************************************************
3060* Report the library versions. *
3061*************************************************/
3062
3063/* There have historically been some issues with binary compatibility in
3064OpenSSL libraries; if Exim (like many other applications) is built against
3065one version of OpenSSL but the run-time linker picks up another version,
3066it can result in serious failures, including crashing with a SIGSEGV. So
3067report the version found by the compiler and the run-time version.
3068
f64a1e23
PP
3069Note: some OS vendors backport security fixes without changing the version
3070number/string, and the version date remains unchanged. The _build_ date
3071will change, so we can more usefully assist with version diagnosis by also
3072reporting the build date.
3073
36f12725
NM
3074Arguments: a FILE* to print the results to
3075Returns: nothing
3076*/
3077
3078void
3079tls_version_report(FILE *f)
3080{
754a0503 3081fprintf(f, "Library version: OpenSSL: Compile: %s\n"
f64a1e23
PP
3082 " Runtime: %s\n"
3083 " : %s\n",
754a0503 3084 OPENSSL_VERSION_TEXT,
f64a1e23
PP
3085 SSLeay_version(SSLEAY_VERSION),
3086 SSLeay_version(SSLEAY_BUILT_ON));
3087/* third line is 38 characters for the %s and the line is 73 chars long;
3088the OpenSSL output includes a "built on: " prefix already. */
36f12725
NM
3089}
3090
9e3331ea
TK
3091
3092
3093
3094/*************************************************
17c76198 3095* Random number generation *
9e3331ea
TK
3096*************************************************/
3097
3098/* Pseudo-random number generation. The result is not expected to be
3099cryptographically strong but not so weak that someone will shoot themselves
3100in the foot using it as a nonce in input in some email header scheme or
3101whatever weirdness they'll twist this into. The result should handle fork()
3102and avoid repeating sequences. OpenSSL handles that for us.
3103
3104Arguments:
3105 max range maximum
3106Returns a random number in range [0, max-1]
3107*/
3108
3109int
17c76198 3110vaguely_random_number(int max)
9e3331ea
TK
3111{
3112unsigned int r;
3113int i, needed_len;
de6135a0
PP
3114static pid_t pidlast = 0;
3115pid_t pidnow;
9e3331ea
TK
3116uschar *p;
3117uschar smallbuf[sizeof(r)];
3118
3119if (max <= 1)
3120 return 0;
3121
de6135a0
PP
3122pidnow = getpid();
3123if (pidnow != pidlast)
3124 {
3125 /* Although OpenSSL documents that "OpenSSL makes sure that the PRNG state
3126 is unique for each thread", this doesn't apparently apply across processes,
3127 so our own warning from vaguely_random_number_fallback() applies here too.
3128 Fix per PostgreSQL. */
3129 if (pidlast != 0)
3130 RAND_cleanup();
3131 pidlast = pidnow;
3132 }
3133
9e3331ea
TK
3134/* OpenSSL auto-seeds from /dev/random, etc, but this a double-check. */
3135if (!RAND_status())
3136 {
3137 randstuff r;
3138 gettimeofday(&r.tv, NULL);
3139 r.p = getpid();
3140
5903c6ff 3141 RAND_seed(US (&r), sizeof(r));
9e3331ea
TK
3142 }
3143/* We're after pseudo-random, not random; if we still don't have enough data
3144in the internal PRNG then our options are limited. We could sleep and hope
3145for entropy to come along (prayer technique) but if the system is so depleted
3146in the first place then something is likely to just keep taking it. Instead,
3147we'll just take whatever little bit of pseudo-random we can still manage to
3148get. */
3149
3150needed_len = sizeof(r);
3151/* Don't take 8 times more entropy than needed if int is 8 octets and we were
3152asked for a number less than 10. */
3153for (r = max, i = 0; r; ++i)
3154 r >>= 1;
3155i = (i + 7) / 8;
3156if (i < needed_len)
3157 needed_len = i;
3158
c8dfb21d 3159#ifdef EXIM_HAVE_RAND_PSEUDO
9e3331ea 3160/* We do not care if crypto-strong */
17c76198 3161i = RAND_pseudo_bytes(smallbuf, needed_len);
c8dfb21d
JH
3162#else
3163i = RAND_bytes(smallbuf, needed_len);
3164#endif
3165
17c76198
PP
3166if (i < 0)
3167 {
3168 DEBUG(D_all)
3169 debug_printf("OpenSSL RAND_pseudo_bytes() not supported by RAND method, using fallback.\n");
3170 return vaguely_random_number_fallback(max);
3171 }
3172
9e3331ea
TK
3173r = 0;
3174for (p = smallbuf; needed_len; --needed_len, ++p)
3175 {
3176 r *= 256;
3177 r += *p;
3178 }
3179
3180/* We don't particularly care about weighted results; if someone wants
3181smooth distribution and cares enough then they should submit a patch then. */
3182return r % max;
3183}
3184
77bb000f
PP
3185
3186
3187
3188/*************************************************
3189* OpenSSL option parse *
3190*************************************************/
3191
3192/* Parse one option for tls_openssl_options_parse below
3193
3194Arguments:
3195 name one option name
3196 value place to store a value for it
3197Returns success or failure in parsing
3198*/
3199
77bb000f 3200
c80c5570 3201
77bb000f
PP
3202static BOOL
3203tls_openssl_one_option_parse(uschar *name, long *value)
3204{
3205int first = 0;
3206int last = exim_openssl_options_size;
3207while (last > first)
3208 {
3209 int middle = (first + last)/2;
3210 int c = Ustrcmp(name, exim_openssl_options[middle].name);
3211 if (c == 0)
3212 {
3213 *value = exim_openssl_options[middle].value;
3214 return TRUE;
3215 }
3216 else if (c > 0)
3217 first = middle + 1;
3218 else
3219 last = middle;
3220 }
3221return FALSE;
3222}
3223
3224
3225
3226
3227/*************************************************
3228* OpenSSL option parsing logic *
3229*************************************************/
3230
3231/* OpenSSL has a number of compatibility options which an administrator might
3232reasonably wish to set. Interpret a list similarly to decode_bits(), so that
3233we look like log_selector.
3234
3235Arguments:
3236 option_spec the administrator-supplied string of options
3237 results ptr to long storage for the options bitmap
3238Returns success or failure
3239*/
3240
3241BOOL
3242tls_openssl_options_parse(uschar *option_spec, long *results)
3243{
3244long result, item;
3245uschar *s, *end;
3246uschar keep_c;
3247BOOL adding, item_parsed;
3248
7006ee24 3249result = SSL_OP_NO_TICKET;
b1770b6e 3250/* Prior to 4.80 we or'd in SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS; removed
da3ad30d 3251 * from default because it increases BEAST susceptibility. */
f0f5a555
PP
3252#ifdef SSL_OP_NO_SSLv2
3253result |= SSL_OP_NO_SSLv2;
3254#endif
a57b6200
JH
3255#ifdef SSL_OP_SINGLE_DH_USE
3256result |= SSL_OP_SINGLE_DH_USE;
3257#endif
77bb000f 3258
7006ee24 3259if (!option_spec)
77bb000f
PP
3260 {
3261 *results = result;
3262 return TRUE;
3263 }
3264
3265for (s=option_spec; *s != '\0'; /**/)
3266 {
3267 while (isspace(*s)) ++s;
3268 if (*s == '\0')
3269 break;
3270 if (*s != '+' && *s != '-')
3271 {
3272 DEBUG(D_tls) debug_printf("malformed openssl option setting: "
0e944a0d 3273 "+ or - expected but found \"%s\"\n", s);
77bb000f
PP
3274 return FALSE;
3275 }
3276 adding = *s++ == '+';
3277 for (end = s; (*end != '\0') && !isspace(*end); ++end) /**/ ;
3278 keep_c = *end;
3279 *end = '\0';
3280 item_parsed = tls_openssl_one_option_parse(s, &item);
96f5fe4c 3281 *end = keep_c;
77bb000f
PP
3282 if (!item_parsed)
3283 {
0e944a0d 3284 DEBUG(D_tls) debug_printf("openssl option setting unrecognised: \"%s\"\n", s);
77bb000f
PP
3285 return FALSE;
3286 }
3287 DEBUG(D_tls) debug_printf("openssl option, %s from %lx: %lx (%s)\n",
3288 adding ? "adding" : "removing", result, item, s);
3289 if (adding)
3290 result |= item;
3291 else
3292 result &= ~item;
77bb000f
PP
3293 s = end;
3294 }
3295
3296*results = result;
3297return TRUE;
3298}
3299
8442641e 3300#endif /*!MACRO_PREDEF*/
9d1c15ef
JH
3301/* vi: aw ai sw=2
3302*/
059ec3d9 3303/* End of tls-openssl.c */