]>
Commit | Line | Data |
---|---|---|
d02b48c6 | 1 | /* ssl/ssl_sess.c */ |
58964a49 | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
d02b48c6 RE |
3 | * All rights reserved. |
4 | * | |
5 | * This package is an SSL implementation written | |
6 | * by Eric Young (eay@cryptsoft.com). | |
7 | * The implementation was written so as to conform with Netscapes SSL. | |
8 | * | |
9 | * This library is free for commercial and non-commercial use as long as | |
10 | * the following conditions are aheared to. The following conditions | |
11 | * apply to all code found in this distribution, be it the RC4, RSA, | |
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | |
13 | * included with this distribution is covered by the same copyright terms | |
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | |
15 | * | |
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | |
17 | * the code are not to be removed. | |
18 | * If this package is used in a product, Eric Young should be given attribution | |
19 | * as the author of the parts of the library used. | |
20 | * This can be in the form of a textual message at program startup or | |
21 | * in documentation (online or textual) provided with the package. | |
22 | * | |
23 | * Redistribution and use in source and binary forms, with or without | |
24 | * modification, are permitted provided that the following conditions | |
25 | * are met: | |
26 | * 1. Redistributions of source code must retain the copyright | |
27 | * notice, this list of conditions and the following disclaimer. | |
28 | * 2. Redistributions in binary form must reproduce the above copyright | |
29 | * notice, this list of conditions and the following disclaimer in the | |
30 | * documentation and/or other materials provided with the distribution. | |
31 | * 3. All advertising materials mentioning features or use of this software | |
32 | * must display the following acknowledgement: | |
33 | * "This product includes cryptographic software written by | |
34 | * Eric Young (eay@cryptsoft.com)" | |
35 | * The word 'cryptographic' can be left out if the rouines from the library | |
36 | * being used are not cryptographic related :-). | |
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | |
38 | * the apps directory (application code) you must include an acknowledgement: | |
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | |
40 | * | |
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | |
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | |
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
51 | * SUCH DAMAGE. | |
52 | * | |
53 | * The licence and distribution terms for any publically available version or | |
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | |
55 | * copied and put under another distribution licence | |
56 | * [including the GNU Public Licence.] | |
57 | */ | |
58 | ||
59 | #include <stdio.h> | |
ec577822 BM |
60 | #include <openssl/lhash.h> |
61 | #include <openssl/rand.h> | |
d02b48c6 RE |
62 | #include "ssl_locl.h" |
63 | ||
58964a49 RE |
64 | static void SSL_SESSION_list_remove(SSL_CTX *ctx, SSL_SESSION *s); |
65 | static void SSL_SESSION_list_add(SSL_CTX *ctx,SSL_SESSION *s); | |
801294f8 | 66 | static int remove_session_lock(SSL_CTX *ctx, SSL_SESSION *c, int lck); |
58964a49 | 67 | |
0821bcd4 | 68 | SSL_SESSION *SSL_get_session(const SSL *ssl) |
52732b38 | 69 | /* aka SSL_get0_session; gets 0 objects, just returns a copy of the pointer */ |
1088e27c BM |
70 | { |
71 | return(ssl->session); | |
72 | } | |
52732b38 BM |
73 | |
74 | SSL_SESSION *SSL_get1_session(SSL *ssl) | |
75 | /* variant of SSL_get_session: caller really gets something */ | |
58964a49 | 76 | { |
b7cfcfb7 MC |
77 | SSL_SESSION *sess; |
78 | /* Need to lock this all up rather than just use CRYPTO_add so that | |
79 | * somebody doesn't free ssl->session between when we check it's | |
80 | * non-null and when we up the reference count. */ | |
9ea72d37 | 81 | CRYPTO_w_lock(CRYPTO_LOCK_SSL_SESSION); |
b7cfcfb7 MC |
82 | sess = ssl->session; |
83 | if(sess) | |
84 | sess->references++; | |
9ea72d37 | 85 | CRYPTO_w_unlock(CRYPTO_LOCK_SSL_SESSION); |
b7cfcfb7 | 86 | return(sess); |
58964a49 RE |
87 | } |
88 | ||
dd9d233e DSH |
89 | int SSL_SESSION_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, |
90 | CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func) | |
b1c4fe36 | 91 | { |
79aa04ef GT |
92 | return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_SSL_SESSION, argl, argp, |
93 | new_func, dup_func, free_func); | |
b1c4fe36 | 94 | } |
58964a49 | 95 | |
6b691a5c | 96 | int SSL_SESSION_set_ex_data(SSL_SESSION *s, int idx, void *arg) |
58964a49 RE |
97 | { |
98 | return(CRYPTO_set_ex_data(&s->ex_data,idx,arg)); | |
99 | } | |
100 | ||
0821bcd4 | 101 | void *SSL_SESSION_get_ex_data(const SSL_SESSION *s, int idx) |
58964a49 RE |
102 | { |
103 | return(CRYPTO_get_ex_data(&s->ex_data,idx)); | |
104 | } | |
105 | ||
6b691a5c | 106 | SSL_SESSION *SSL_SESSION_new(void) |
d02b48c6 RE |
107 | { |
108 | SSL_SESSION *ss; | |
109 | ||
26a3a48d | 110 | ss=(SSL_SESSION *)OPENSSL_malloc(sizeof(SSL_SESSION)); |
d02b48c6 RE |
111 | if (ss == NULL) |
112 | { | |
113 | SSLerr(SSL_F_SSL_SESSION_NEW,ERR_R_MALLOC_FAILURE); | |
114 | return(0); | |
115 | } | |
116 | memset(ss,0,sizeof(SSL_SESSION)); | |
117 | ||
b1fe6ca1 | 118 | ss->verify_result = 1; /* avoid 0 (= X509_V_OK) just in case */ |
d02b48c6 RE |
119 | ss->references=1; |
120 | ss->timeout=60*5+4; /* 5 minute timeout by default */ | |
7bbcb2f6 | 121 | ss->time=(unsigned long)time(NULL); |
58964a49 RE |
122 | ss->prev=NULL; |
123 | ss->next=NULL; | |
413c4f45 | 124 | ss->compress_meth=0; |
79aa04ef | 125 | CRYPTO_new_ex_data(CRYPTO_EX_INDEX_SSL_SESSION, ss, &ss->ex_data); |
d02b48c6 RE |
126 | return(ss); |
127 | } | |
128 | ||
4879ec7b GT |
129 | const unsigned char *SSL_SESSION_get_id(const SSL_SESSION *s, unsigned int *len) |
130 | { | |
131 | if(len) | |
132 | *len = s->session_id_length; | |
133 | return s->session_id; | |
134 | } | |
135 | ||
dc644fe2 GT |
136 | /* Even with SSLv2, we have 16 bytes (128 bits) of session ID space. SSLv3/TLSv1 |
137 | * has 32 bytes (256 bits). As such, filling the ID with random gunk repeatedly | |
138 | * until we have no conflict is going to complete in one iteration pretty much | |
139 | * "most" of the time (btw: understatement). So, if it takes us 10 iterations | |
140 | * and we still can't avoid a conflict - well that's a reasonable point to call | |
141 | * it quits. Either the RAND code is broken or someone is trying to open roughly | |
142 | * very close to 2^128 (or 2^256) SSL sessions to our server. How you might | |
143 | * store that many sessions is perhaps a more interesting question ... */ | |
144 | ||
145 | #define MAX_SESS_ID_ATTEMPTS 10 | |
146 | static int def_generate_session_id(const SSL *ssl, unsigned char *id, | |
147 | unsigned int *id_len) | |
148 | { | |
149 | unsigned int retry = 0; | |
150 | do | |
7c7667b8 NL |
151 | if (RAND_pseudo_bytes(id, *id_len) <= 0) |
152 | return 0; | |
f85c9904 | 153 | while(SSL_has_matching_session_id(ssl, id, *id_len) && |
dc644fe2 GT |
154 | (++retry < MAX_SESS_ID_ATTEMPTS)); |
155 | if(retry < MAX_SESS_ID_ATTEMPTS) | |
156 | return 1; | |
157 | /* else - woops a session_id match */ | |
158 | /* XXX We should also check the external cache -- | |
159 | * but the probability of a collision is negligible, and | |
160 | * we could not prevent the concurrent creation of sessions | |
161 | * with identical IDs since we currently don't have means | |
162 | * to atomically check whether a session ID already exists | |
163 | * and make a reservation for it if it does not | |
164 | * (this problem applies to the internal cache as well). | |
165 | */ | |
166 | return 0; | |
167 | } | |
168 | ||
6b691a5c | 169 | int ssl_get_new_session(SSL *s, int session) |
d02b48c6 | 170 | { |
b56bce4f BM |
171 | /* This gets used by clients and servers. */ |
172 | ||
dc644fe2 | 173 | unsigned int tmp; |
d02b48c6 | 174 | SSL_SESSION *ss=NULL; |
dc644fe2 | 175 | GEN_SESSION_CB cb = def_generate_session_id; |
d02b48c6 RE |
176 | |
177 | if ((ss=SSL_SESSION_new()) == NULL) return(0); | |
178 | ||
179 | /* If the context has a default timeout, use it */ | |
413c4f45 | 180 | if (s->ctx->session_timeout == 0) |
d02b48c6 | 181 | ss->timeout=SSL_get_default_timeout(s); |
413c4f45 MC |
182 | else |
183 | ss->timeout=s->ctx->session_timeout; | |
d02b48c6 RE |
184 | |
185 | if (s->session != NULL) | |
186 | { | |
187 | SSL_SESSION_free(s->session); | |
188 | s->session=NULL; | |
189 | } | |
190 | ||
191 | if (session) | |
192 | { | |
6d02d8e4 | 193 | if (s->version == SSL2_VERSION) |
d02b48c6 | 194 | { |
58964a49 | 195 | ss->ssl_version=SSL2_VERSION; |
d02b48c6 RE |
196 | ss->session_id_length=SSL2_SSL_SESSION_ID_LENGTH; |
197 | } | |
58964a49 | 198 | else if (s->version == SSL3_VERSION) |
d02b48c6 | 199 | { |
58964a49 RE |
200 | ss->ssl_version=SSL3_VERSION; |
201 | ss->session_id_length=SSL3_SSL_SESSION_ID_LENGTH; | |
202 | } | |
203 | else if (s->version == TLS1_VERSION) | |
204 | { | |
205 | ss->ssl_version=TLS1_VERSION; | |
d02b48c6 RE |
206 | ss->session_id_length=SSL3_SSL_SESSION_ID_LENGTH; |
207 | } | |
36d16f8e BL |
208 | else if (s->version == DTLS1_VERSION) |
209 | { | |
210 | ss->ssl_version=DTLS1_VERSION; | |
211 | ss->session_id_length=SSL3_SSL_SESSION_ID_LENGTH; | |
212 | } | |
d02b48c6 RE |
213 | else |
214 | { | |
215 | SSLerr(SSL_F_SSL_GET_NEW_SESSION,SSL_R_UNSUPPORTED_SSL_VERSION); | |
216 | SSL_SESSION_free(ss); | |
217 | return(0); | |
218 | } | |
dc644fe2 GT |
219 | /* Choose which callback will set the session ID */ |
220 | CRYPTO_r_lock(CRYPTO_LOCK_SSL_CTX); | |
221 | if(s->generate_session_id) | |
222 | cb = s->generate_session_id; | |
223 | else if(s->ctx->generate_session_id) | |
224 | cb = s->ctx->generate_session_id; | |
225 | CRYPTO_r_unlock(CRYPTO_LOCK_SSL_CTX); | |
226 | /* Choose a session ID */ | |
227 | tmp = ss->session_id_length; | |
228 | if(!cb(s, ss->session_id, &tmp)) | |
229 | { | |
230 | /* The callback failed */ | |
231 | SSLerr(SSL_F_SSL_GET_NEW_SESSION, | |
232 | SSL_R_SSL_SESSION_ID_CALLBACK_FAILED); | |
233 | SSL_SESSION_free(ss); | |
234 | return(0); | |
235 | } | |
236 | /* Don't allow the callback to set the session length to zero. | |
237 | * nor set it higher than it was. */ | |
238 | if(!tmp || (tmp > ss->session_id_length)) | |
d02b48c6 | 239 | { |
dc644fe2 GT |
240 | /* The callback set an illegal length */ |
241 | SSLerr(SSL_F_SSL_GET_NEW_SESSION, | |
242 | SSL_R_SSL_SESSION_ID_HAS_BAD_LENGTH); | |
243 | SSL_SESSION_free(ss); | |
244 | return(0); | |
245 | } | |
246 | /* If the session length was shrunk and we're SSLv2, pad it */ | |
247 | if((tmp < ss->session_id_length) && (s->version == SSL2_VERSION)) | |
248 | memset(ss->session_id + tmp, 0, ss->session_id_length - tmp); | |
249 | else | |
250 | ss->session_id_length = tmp; | |
251 | /* Finally, check for a conflict */ | |
f85c9904 | 252 | if(SSL_has_matching_session_id(s, ss->session_id, |
dc644fe2 GT |
253 | ss->session_id_length)) |
254 | { | |
255 | SSLerr(SSL_F_SSL_GET_NEW_SESSION, | |
256 | SSL_R_SSL_SESSION_ID_CONFLICT); | |
257 | SSL_SESSION_free(ss); | |
258 | return(0); | |
d02b48c6 RE |
259 | } |
260 | } | |
261 | else | |
262 | { | |
263 | ss->session_id_length=0; | |
264 | } | |
265 | ||
5574e0ed BM |
266 | if (s->sid_ctx_length > sizeof ss->sid_ctx) |
267 | { | |
268 | SSLerr(SSL_F_SSL_GET_NEW_SESSION, ERR_R_INTERNAL_ERROR); | |
269 | SSL_SESSION_free(ss); | |
270 | return 0; | |
271 | } | |
b4cadc6e BL |
272 | memcpy(ss->sid_ctx,s->sid_ctx,s->sid_ctx_length); |
273 | ss->sid_ctx_length=s->sid_ctx_length; | |
d02b48c6 RE |
274 | s->session=ss; |
275 | ss->ssl_version=s->version; | |
b1fe6ca1 | 276 | ss->verify_result = X509_V_OK; |
d02b48c6 RE |
277 | |
278 | return(1); | |
279 | } | |
280 | ||
6b691a5c | 281 | int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len) |
d02b48c6 | 282 | { |
b56bce4f BM |
283 | /* This is used only by servers. */ |
284 | ||
58964a49 | 285 | SSL_SESSION *ret=NULL,data; |
8876bc05 | 286 | int fatal = 0; |
d02b48c6 | 287 | |
d02b48c6 RE |
288 | data.ssl_version=s->version; |
289 | data.session_id_length=len; | |
290 | if (len > SSL_MAX_SSL_SESSION_ID_LENGTH) | |
8876bc05 | 291 | goto err; |
b4cadc6e | 292 | memcpy(data.session_id,session_id,len); |
d02b48c6 | 293 | |
58964a49 RE |
294 | if (!(s->ctx->session_cache_mode & SSL_SESS_CACHE_NO_INTERNAL_LOOKUP)) |
295 | { | |
296 | CRYPTO_r_lock(CRYPTO_LOCK_SSL_CTX); | |
9d1a01be | 297 | ret=(SSL_SESSION *)lh_retrieve(s->ctx->sessions,&data); |
bdc98ffb BM |
298 | if (ret != NULL) |
299 | /* don't allow other threads to steal it: */ | |
300 | CRYPTO_add(&ret->references,1,CRYPTO_LOCK_SSL_SESSION); | |
58964a49 RE |
301 | CRYPTO_r_unlock(CRYPTO_LOCK_SSL_CTX); |
302 | } | |
d02b48c6 RE |
303 | |
304 | if (ret == NULL) | |
305 | { | |
9a193d88 BM |
306 | int copy=1; |
307 | ||
413c4f45 | 308 | s->ctx->stats.sess_miss++; |
d02b48c6 | 309 | ret=NULL; |
b4cadc6e BL |
310 | if (s->ctx->get_session_cb != NULL |
311 | && (ret=s->ctx->get_session_cb(s,session_id,len,©)) | |
312 | != NULL) | |
d02b48c6 | 313 | { |
413c4f45 | 314 | s->ctx->stats.sess_cb_hit++; |
d02b48c6 | 315 | |
8876bc05 BM |
316 | /* Increment reference count now if the session callback |
317 | * asks us to do so (note that if the session structures | |
318 | * returned by the callback are shared between threads, | |
319 | * it must handle the reference count itself [i.e. copy == 0], | |
320 | * or things won't be thread-safe). */ | |
321 | if (copy) | |
322 | CRYPTO_add(&ret->references,1,CRYPTO_LOCK_SSL_SESSION); | |
323 | ||
e0db2eed GT |
324 | /* Add the externally cached session to the internal |
325 | * cache as well if and only if we are supposed to. */ | |
326 | if(!(s->ctx->session_cache_mode & SSL_SESS_CACHE_NO_INTERNAL_STORE)) | |
327 | /* The following should not return 1, otherwise, | |
328 | * things are very strange */ | |
329 | SSL_CTX_add_session(s->ctx,ret); | |
d02b48c6 | 330 | } |
8876bc05 BM |
331 | if (ret == NULL) |
332 | goto err; | |
d02b48c6 RE |
333 | } |
334 | ||
8876bc05 BM |
335 | /* Now ret is non-NULL, and we own one of its reference counts. */ |
336 | ||
b4cadc6e BL |
337 | if((s->verify_mode&SSL_VERIFY_PEER) |
338 | && (!s->sid_ctx_length || ret->sid_ctx_length != s->sid_ctx_length | |
339 | || memcmp(ret->sid_ctx,s->sid_ctx,ret->sid_ctx_length))) | |
340 | { | |
8876bc05 BM |
341 | /* We've found the session named by the client, but we don't |
342 | * want to use it in this context. */ | |
343 | ||
344 | if (s->sid_ctx_length == 0) | |
345 | { | |
346 | /* application should have used SSL[_CTX]_set_session_id_context | |
347 | * -- we could tolerate this and just pretend we never heard | |
348 | * of this session, but then applications could effectively | |
349 | * disable the session cache by accident without anyone noticing */ | |
350 | ||
673eadec | 351 | SSLerr(SSL_F_SSL_GET_PREV_SESSION,SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED); |
8876bc05 BM |
352 | fatal = 1; |
353 | goto err; | |
354 | } | |
355 | else | |
356 | { | |
357 | #if 0 /* The client cannot always know when a session is not appropriate, | |
358 | * so we shouldn't generate an error message. */ | |
359 | ||
360 | SSLerr(SSL_F_SSL_GET_PREV_SESSION,SSL_R_ATTEMPT_TO_REUSE_SESSION_IN_DIFFERENT_CONTEXT); | |
361 | #endif | |
362 | goto err; /* treat like cache miss */ | |
363 | } | |
364 | } | |
b4cadc6e | 365 | |
d02b48c6 RE |
366 | if (ret->cipher == NULL) |
367 | { | |
c5db363e | 368 | unsigned char buf[5],*p; |
d02b48c6 RE |
369 | unsigned long l; |
370 | ||
371 | p=buf; | |
372 | l=ret->cipher_id; | |
373 | l2n(l,p); | |
58964a49 | 374 | if ((ret->ssl_version>>8) == SSL3_VERSION_MAJOR) |
d02b48c6 RE |
375 | ret->cipher=ssl_get_cipher_by_char(s,&(buf[2])); |
376 | else | |
377 | ret->cipher=ssl_get_cipher_by_char(s,&(buf[1])); | |
378 | if (ret->cipher == NULL) | |
8876bc05 | 379 | goto err; |
d02b48c6 RE |
380 | } |
381 | ||
8876bc05 BM |
382 | |
383 | #if 0 /* This is way too late. */ | |
384 | ||
d02b48c6 | 385 | /* If a thread got the session, then 'swaped', and another got |
26a3a48d | 386 | * it and then due to a time-out decided to 'OPENSSL_free' it we could |
d02b48c6 RE |
387 | * be in trouble. So I'll increment it now, then double decrement |
388 | * later - am I speaking rubbish?. */ | |
389 | CRYPTO_add(&ret->references,1,CRYPTO_LOCK_SSL_SESSION); | |
8876bc05 | 390 | #endif |
d02b48c6 | 391 | |
7476f3ac | 392 | if (ret->timeout < (long)(time(NULL) - ret->time)) /* timeout */ |
d02b48c6 | 393 | { |
413c4f45 | 394 | s->ctx->stats.sess_timeout++; |
d02b48c6 RE |
395 | /* remove it from the cache */ |
396 | SSL_CTX_remove_session(s->ctx,ret); | |
8876bc05 | 397 | goto err; |
d02b48c6 RE |
398 | } |
399 | ||
413c4f45 | 400 | s->ctx->stats.sess_hit++; |
d02b48c6 RE |
401 | |
402 | /* ret->time=time(NULL); */ /* rezero timeout? */ | |
403 | /* again, just leave the session | |
404 | * if it is the same session, we have just incremented and | |
405 | * then decremented the reference count :-) */ | |
406 | if (s->session != NULL) | |
407 | SSL_SESSION_free(s->session); | |
408 | s->session=ret; | |
b1fe6ca1 | 409 | s->verify_result = s->session->verify_result; |
d02b48c6 | 410 | return(1); |
8876bc05 BM |
411 | |
412 | err: | |
413 | if (ret != NULL) | |
414 | SSL_SESSION_free(ret); | |
415 | if (fatal) | |
416 | return -1; | |
417 | else | |
418 | return 0; | |
d02b48c6 RE |
419 | } |
420 | ||
6b691a5c | 421 | int SSL_CTX_add_session(SSL_CTX *ctx, SSL_SESSION *c) |
d02b48c6 | 422 | { |
58964a49 | 423 | int ret=0; |
d02b48c6 RE |
424 | SSL_SESSION *s; |
425 | ||
45fd4dbb BM |
426 | /* add just 1 reference count for the SSL_CTX's session cache |
427 | * even though it has two ways of access: each session is in a | |
428 | * doubly linked list and an lhash */ | |
d02b48c6 | 429 | CRYPTO_add(&c->references,1,CRYPTO_LOCK_SSL_SESSION); |
45fd4dbb | 430 | /* if session c is in already in cache, we take back the increment later */ |
d02b48c6 RE |
431 | |
432 | CRYPTO_w_lock(CRYPTO_LOCK_SSL_CTX); | |
9d1a01be | 433 | s=(SSL_SESSION *)lh_insert(ctx->sessions,c); |
58964a49 | 434 | |
45fd4dbb BM |
435 | /* s != NULL iff we already had a session with the given PID. |
436 | * In this case, s == c should hold (then we did not really modify | |
437 | * ctx->sessions), or we're in trouble. */ | |
438 | if (s != NULL && s != c) | |
439 | { | |
440 | /* We *are* in trouble ... */ | |
441 | SSL_SESSION_list_remove(ctx,s); | |
442 | SSL_SESSION_free(s); | |
443 | /* ... so pretend the other session did not exist in cache | |
444 | * (we cannot handle two SSL_SESSION structures with identical | |
445 | * session ID in the same cache, which could happen e.g. when | |
446 | * two threads concurrently obtain the same session from an external | |
447 | * cache) */ | |
448 | s = NULL; | |
449 | } | |
450 | ||
451 | /* Put at the head of the queue unless it is already in the cache */ | |
58964a49 RE |
452 | if (s == NULL) |
453 | SSL_SESSION_list_add(ctx,c); | |
d02b48c6 | 454 | |
d02b48c6 RE |
455 | if (s != NULL) |
456 | { | |
45fd4dbb BM |
457 | /* existing cache entry -- decrement previously incremented reference |
458 | * count because it already takes into account the cache */ | |
459 | ||
460 | SSL_SESSION_free(s); /* s == c */ | |
58964a49 | 461 | ret=0; |
d02b48c6 RE |
462 | } |
463 | else | |
58964a49 | 464 | { |
45fd4dbb BM |
465 | /* new cache entry -- remove old ones if cache has become too large */ |
466 | ||
58964a49 RE |
467 | ret=1; |
468 | ||
469 | if (SSL_CTX_sess_get_cache_size(ctx) > 0) | |
470 | { | |
471 | while (SSL_CTX_sess_number(ctx) > | |
472 | SSL_CTX_sess_get_cache_size(ctx)) | |
473 | { | |
801294f8 DSH |
474 | if (!remove_session_lock(ctx, |
475 | ctx->session_cache_tail, 0)) | |
58964a49 RE |
476 | break; |
477 | else | |
413c4f45 | 478 | ctx->stats.sess_cache_full++; |
58964a49 RE |
479 | } |
480 | } | |
481 | } | |
482 | CRYPTO_w_unlock(CRYPTO_LOCK_SSL_CTX); | |
483 | return(ret); | |
d02b48c6 RE |
484 | } |
485 | ||
6b691a5c | 486 | int SSL_CTX_remove_session(SSL_CTX *ctx, SSL_SESSION *c) |
801294f8 DSH |
487 | { |
488 | return remove_session_lock(ctx, c, 1); | |
489 | } | |
490 | ||
0fda2e37 | 491 | static int remove_session_lock(SSL_CTX *ctx, SSL_SESSION *c, int lck) |
d02b48c6 RE |
492 | { |
493 | SSL_SESSION *r; | |
494 | int ret=0; | |
495 | ||
58964a49 | 496 | if ((c != NULL) && (c->session_id_length != 0)) |
d02b48c6 | 497 | { |
801294f8 | 498 | if(lck) CRYPTO_w_lock(CRYPTO_LOCK_SSL_CTX); |
acfe628b | 499 | if ((r = (SSL_SESSION *)lh_retrieve(ctx->sessions,c)) == c) |
58964a49 RE |
500 | { |
501 | ret=1; | |
acfe628b | 502 | r=(SSL_SESSION *)lh_delete(ctx->sessions,c); |
58964a49 RE |
503 | SSL_SESSION_list_remove(ctx,c); |
504 | } | |
d02b48c6 | 505 | |
801294f8 | 506 | if(lck) CRYPTO_w_unlock(CRYPTO_LOCK_SSL_CTX); |
d02b48c6 RE |
507 | |
508 | if (ret) | |
509 | { | |
510 | r->not_resumable=1; | |
511 | if (ctx->remove_session_cb != NULL) | |
58964a49 | 512 | ctx->remove_session_cb(ctx,r); |
d02b48c6 RE |
513 | SSL_SESSION_free(r); |
514 | } | |
515 | } | |
516 | else | |
517 | ret=0; | |
518 | return(ret); | |
519 | } | |
520 | ||
6b691a5c | 521 | void SSL_SESSION_free(SSL_SESSION *ss) |
d02b48c6 RE |
522 | { |
523 | int i; | |
524 | ||
e03ddfae BL |
525 | if(ss == NULL) |
526 | return; | |
527 | ||
d02b48c6 | 528 | i=CRYPTO_add(&ss->references,-1,CRYPTO_LOCK_SSL_SESSION); |
58964a49 RE |
529 | #ifdef REF_PRINT |
530 | REF_PRINT("SSL_SESSION",ss); | |
531 | #endif | |
d02b48c6 RE |
532 | if (i > 0) return; |
533 | #ifdef REF_CHECK | |
534 | if (i < 0) | |
535 | { | |
536 | fprintf(stderr,"SSL_SESSION_free, bad reference count\n"); | |
537 | abort(); /* ok */ | |
538 | } | |
539 | #endif | |
540 | ||
79aa04ef | 541 | CRYPTO_free_ex_data(CRYPTO_EX_INDEX_SSL_SESSION, ss, &ss->ex_data); |
58964a49 | 542 | |
4579924b RL |
543 | OPENSSL_cleanse(ss->key_arg,sizeof ss->key_arg); |
544 | OPENSSL_cleanse(ss->master_key,sizeof ss->master_key); | |
545 | OPENSSL_cleanse(ss->session_id,sizeof ss->session_id); | |
b56bce4f | 546 | if (ss->sess_cert != NULL) ssl_sess_cert_free(ss->sess_cert); |
d02b48c6 | 547 | if (ss->peer != NULL) X509_free(ss->peer); |
f73e07cf | 548 | if (ss->ciphers != NULL) sk_SSL_CIPHER_free(ss->ciphers); |
4579924b | 549 | OPENSSL_cleanse(ss,sizeof(*ss)); |
26a3a48d | 550 | OPENSSL_free(ss); |
d02b48c6 RE |
551 | } |
552 | ||
6b691a5c | 553 | int SSL_set_session(SSL *s, SSL_SESSION *session) |
d02b48c6 RE |
554 | { |
555 | int ret=0; | |
4ebb342f | 556 | const SSL_METHOD *meth; |
d02b48c6 RE |
557 | |
558 | if (session != NULL) | |
559 | { | |
560 | meth=s->ctx->method->get_ssl_method(session->ssl_version); | |
561 | if (meth == NULL) | |
562 | meth=s->method->get_ssl_method(session->ssl_version); | |
563 | if (meth == NULL) | |
564 | { | |
565 | SSLerr(SSL_F_SSL_SET_SESSION,SSL_R_UNABLE_TO_FIND_SSL_METHOD); | |
566 | return(0); | |
567 | } | |
568 | ||
569 | if (meth != s->method) | |
570 | { | |
571 | if (!SSL_set_ssl_method(s,meth)) | |
572 | return(0); | |
413c4f45 MC |
573 | if (s->ctx->session_timeout == 0) |
574 | session->timeout=SSL_get_default_timeout(s); | |
575 | else | |
576 | session->timeout=s->ctx->session_timeout; | |
d02b48c6 RE |
577 | } |
578 | ||
882e8912 RL |
579 | #ifndef OPENSSL_NO_KRB5 |
580 | if (s->kssl_ctx && !s->kssl_ctx->client_princ && | |
581 | session->krb5_client_princ_len > 0) | |
582 | { | |
583 | s->kssl_ctx->client_princ = (char *)malloc(session->krb5_client_princ_len + 1); | |
584 | memcpy(s->kssl_ctx->client_princ,session->krb5_client_princ, | |
585 | session->krb5_client_princ_len); | |
c2a3358b | 586 | s->kssl_ctx->client_princ[session->krb5_client_princ_len] = '\0'; |
882e8912 RL |
587 | } |
588 | #endif /* OPENSSL_NO_KRB5 */ | |
589 | ||
d02b48c6 RE |
590 | /* CRYPTO_w_lock(CRYPTO_LOCK_SSL);*/ |
591 | CRYPTO_add(&session->references,1,CRYPTO_LOCK_SSL_SESSION); | |
592 | if (s->session != NULL) | |
593 | SSL_SESSION_free(s->session); | |
594 | s->session=session; | |
0dd2254d | 595 | s->verify_result = s->session->verify_result; |
d02b48c6 RE |
596 | /* CRYPTO_w_unlock(CRYPTO_LOCK_SSL);*/ |
597 | ret=1; | |
598 | } | |
58964a49 RE |
599 | else |
600 | { | |
601 | if (s->session != NULL) | |
602 | { | |
603 | SSL_SESSION_free(s->session); | |
604 | s->session=NULL; | |
605 | } | |
413c4f45 MC |
606 | |
607 | meth=s->ctx->method; | |
608 | if (meth != s->method) | |
609 | { | |
610 | if (!SSL_set_ssl_method(s,meth)) | |
611 | return(0); | |
612 | } | |
613 | ret=1; | |
58964a49 | 614 | } |
d02b48c6 RE |
615 | return(ret); |
616 | } | |
617 | ||
6b691a5c | 618 | long SSL_SESSION_set_timeout(SSL_SESSION *s, long t) |
d02b48c6 RE |
619 | { |
620 | if (s == NULL) return(0); | |
621 | s->timeout=t; | |
622 | return(1); | |
623 | } | |
624 | ||
0821bcd4 | 625 | long SSL_SESSION_get_timeout(const SSL_SESSION *s) |
d02b48c6 RE |
626 | { |
627 | if (s == NULL) return(0); | |
628 | return(s->timeout); | |
629 | } | |
630 | ||
0821bcd4 | 631 | long SSL_SESSION_get_time(const SSL_SESSION *s) |
d02b48c6 RE |
632 | { |
633 | if (s == NULL) return(0); | |
634 | return(s->time); | |
635 | } | |
636 | ||
6b691a5c | 637 | long SSL_SESSION_set_time(SSL_SESSION *s, long t) |
d02b48c6 RE |
638 | { |
639 | if (s == NULL) return(0); | |
640 | s->time=t; | |
641 | return(t); | |
642 | } | |
643 | ||
6b691a5c | 644 | long SSL_CTX_set_timeout(SSL_CTX *s, long t) |
413c4f45 MC |
645 | { |
646 | long l; | |
647 | if (s == NULL) return(0); | |
648 | l=s->session_timeout; | |
649 | s->session_timeout=t; | |
650 | return(l); | |
651 | } | |
652 | ||
0821bcd4 | 653 | long SSL_CTX_get_timeout(const SSL_CTX *s) |
413c4f45 MC |
654 | { |
655 | if (s == NULL) return(0); | |
656 | return(s->session_timeout); | |
657 | } | |
658 | ||
d02b48c6 RE |
659 | typedef struct timeout_param_st |
660 | { | |
661 | SSL_CTX *ctx; | |
662 | long time; | |
663 | LHASH *cache; | |
664 | } TIMEOUT_PARAM; | |
665 | ||
6b691a5c | 666 | static void timeout(SSL_SESSION *s, TIMEOUT_PARAM *p) |
d02b48c6 RE |
667 | { |
668 | if ((p->time == 0) || (p->time > (s->time+s->timeout))) /* timeout */ | |
669 | { | |
58964a49 RE |
670 | /* The reason we don't call SSL_CTX_remove_session() is to |
671 | * save on locking overhead */ | |
9d1a01be | 672 | lh_delete(p->cache,s); |
58964a49 | 673 | SSL_SESSION_list_remove(p->ctx,s); |
d02b48c6 RE |
674 | s->not_resumable=1; |
675 | if (p->ctx->remove_session_cb != NULL) | |
676 | p->ctx->remove_session_cb(p->ctx,s); | |
677 | SSL_SESSION_free(s); | |
678 | } | |
679 | } | |
680 | ||
3c914840 GT |
681 | static IMPLEMENT_LHASH_DOALL_ARG_FN(timeout, SSL_SESSION *, TIMEOUT_PARAM *) |
682 | ||
6b691a5c | 683 | void SSL_CTX_flush_sessions(SSL_CTX *s, long t) |
d02b48c6 RE |
684 | { |
685 | unsigned long i; | |
686 | TIMEOUT_PARAM tp; | |
687 | ||
688 | tp.ctx=s; | |
413c4f45 | 689 | tp.cache=s->sessions; |
d02b48c6 RE |
690 | if (tp.cache == NULL) return; |
691 | tp.time=t; | |
692 | CRYPTO_w_lock(CRYPTO_LOCK_SSL_CTX); | |
693 | i=tp.cache->down_load; | |
694 | tp.cache->down_load=0; | |
3c914840 | 695 | lh_doall_arg(tp.cache, LHASH_DOALL_ARG_FN(timeout), &tp); |
d02b48c6 RE |
696 | tp.cache->down_load=i; |
697 | CRYPTO_w_unlock(CRYPTO_LOCK_SSL_CTX); | |
698 | } | |
699 | ||
6b691a5c | 700 | int ssl_clear_bad_session(SSL *s) |
d02b48c6 RE |
701 | { |
702 | if ( (s->session != NULL) && | |
703 | !(s->shutdown & SSL_SENT_SHUTDOWN) && | |
704 | !(SSL_in_init(s) || SSL_in_before(s))) | |
705 | { | |
706 | SSL_CTX_remove_session(s->ctx,s->session); | |
707 | return(1); | |
708 | } | |
709 | else | |
710 | return(0); | |
711 | } | |
58964a49 RE |
712 | |
713 | /* locked by SSL_CTX in the calling function */ | |
6b691a5c | 714 | static void SSL_SESSION_list_remove(SSL_CTX *ctx, SSL_SESSION *s) |
58964a49 RE |
715 | { |
716 | if ((s->next == NULL) || (s->prev == NULL)) return; | |
717 | ||
718 | if (s->next == (SSL_SESSION *)&(ctx->session_cache_tail)) | |
719 | { /* last element in list */ | |
720 | if (s->prev == (SSL_SESSION *)&(ctx->session_cache_head)) | |
721 | { /* only one element in list */ | |
722 | ctx->session_cache_head=NULL; | |
723 | ctx->session_cache_tail=NULL; | |
724 | } | |
725 | else | |
726 | { | |
727 | ctx->session_cache_tail=s->prev; | |
728 | s->prev->next=(SSL_SESSION *)&(ctx->session_cache_tail); | |
729 | } | |
730 | } | |
731 | else | |
732 | { | |
733 | if (s->prev == (SSL_SESSION *)&(ctx->session_cache_head)) | |
734 | { /* first element in list */ | |
735 | ctx->session_cache_head=s->next; | |
736 | s->next->prev=(SSL_SESSION *)&(ctx->session_cache_head); | |
737 | } | |
738 | else | |
739 | { /* middle of list */ | |
740 | s->next->prev=s->prev; | |
741 | s->prev->next=s->next; | |
742 | } | |
743 | } | |
744 | s->prev=s->next=NULL; | |
745 | } | |
746 | ||
6b691a5c | 747 | static void SSL_SESSION_list_add(SSL_CTX *ctx, SSL_SESSION *s) |
58964a49 RE |
748 | { |
749 | if ((s->next != NULL) && (s->prev != NULL)) | |
750 | SSL_SESSION_list_remove(ctx,s); | |
751 | ||
752 | if (ctx->session_cache_head == NULL) | |
753 | { | |
754 | ctx->session_cache_head=s; | |
755 | ctx->session_cache_tail=s; | |
756 | s->prev=(SSL_SESSION *)&(ctx->session_cache_head); | |
757 | s->next=(SSL_SESSION *)&(ctx->session_cache_tail); | |
758 | } | |
759 | else | |
760 | { | |
761 | s->next=ctx->session_cache_head; | |
762 | s->next->prev=s; | |
763 | s->prev=(SSL_SESSION *)&(ctx->session_cache_head); | |
764 | ctx->session_cache_head=s; | |
765 | } | |
766 | } | |
767 |