summaryrefslogtreecommitdiff
path: root/src/cachefkcrt.cc
diff options
context:
space:
mode:
Diffstat (limited to 'src/cachefkcrt.cc')
-rw-r--r--src/cachefkcrt.cc183
1 files changed, 183 insertions, 0 deletions
diff --git a/src/cachefkcrt.cc b/src/cachefkcrt.cc
new file mode 100644
index 0000000..e6cd216
--- /dev/null
+++ b/src/cachefkcrt.cc
@@ -0,0 +1,183 @@
+/*-
+ * SSLsplit - transparent SSL/TLS interception
+ * https://www.roe.ch/SSLsplit
+ *
+ * Copyright (c) 2009-2018, Daniel Roethlisberger <[email protected]>.
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions are met:
+ * 1. Redistributions of source code must retain the above copyright notice,
+ * this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright notice,
+ * this list of conditions and the following disclaimer in the documentation
+ * and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER AND CONTRIBUTORS ``AS IS''
+ * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
+ * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include "cachefkcrt.h"
+
+#include "ssl.h"
+#include "khash.h"
+
+/*
+ * Cache for generated fake certificates.
+ *
+ * key: char[SSL_X509_FPRSZ] fingerprint of original server cert
+ * val: X509 * generated fake certificate
+ */
+
+static inline khint_t
+kh_x509fpr_hash_func(void *b)
+{
+ khint_t *p = (khint_t*)(((char*)b) + SSL_X509_FPRSZ);
+ khint_t h = 0;
+
+ /* assumes fpr is uniformly distributed */
+ while (--p >= (khint_t*)b)
+ h ^= *p;
+ return h;
+}
+
+#define kh_x509fpr_hash_equal(a, b) \
+ (memcmp((char*)(a), (char*)(b), SSL_X509_FPRSZ) == 0)
+
+KHASH_INIT(sha1map_t, void*, void*, 1, kh_x509fpr_hash_func,
+ kh_x509fpr_hash_equal)
+
+static khash_t(sha1map_t) *certmap;
+
+static cache_iter_t
+cachefkcrt_begin_cb(void)
+{
+ return kh_begin(certmap);
+}
+
+static cache_iter_t
+cachefkcrt_end_cb(void)
+{
+ return kh_end(certmap);
+}
+
+static int
+cachefkcrt_exist_cb(cache_iter_t it)
+{
+ return kh_exist(certmap, it);
+}
+
+static void
+cachefkcrt_del_cb(cache_iter_t it)
+{
+ kh_del(sha1map_t, certmap, it);
+}
+
+static cache_iter_t
+cachefkcrt_get_cb(cache_key_t key)
+{
+ return kh_get(sha1map_t, certmap, key);
+}
+
+static cache_iter_t
+cachefkcrt_put_cb(cache_key_t key, int *ret)
+{
+ return kh_put(sha1map_t, certmap, key, ret);
+}
+
+static void
+cachefkcrt_free_key_cb(cache_key_t key)
+{
+ free(key);
+}
+
+static void
+cachefkcrt_free_val_cb(cache_val_t val)
+{
+ X509_free((x509_st *)val);
+}
+
+static cache_key_t
+cachefkcrt_get_key_cb(cache_iter_t it)
+{
+ return kh_key(certmap, it);
+}
+
+static cache_val_t
+cachefkcrt_get_val_cb(cache_iter_t it)
+{
+ return kh_val(certmap, it);
+}
+
+static void
+cachefkcrt_set_val_cb(cache_iter_t it, cache_val_t val)
+{
+ kh_val(certmap, it) = val;
+}
+
+static cache_val_t
+cachefkcrt_unpackverify_val_cb(cache_val_t val, int copy)
+{
+ if (!ssl_x509_is_valid((x509_st *)val))
+ return NULL;
+ if (copy) {
+ ssl_x509_refcount_inc((X509 *)val);
+ return val;
+ }
+ return ((void*)-1);
+}
+
+static void
+cachefkcrt_fini_cb(void)
+{
+ kh_destroy(sha1map_t, certmap);
+}
+
+void
+cachefkcrt_init_cb(cache_t *cache)
+{
+ certmap = kh_init(sha1map_t);
+
+ cache->begin_cb = cachefkcrt_begin_cb;
+ cache->end_cb = cachefkcrt_end_cb;
+ cache->exist_cb = cachefkcrt_exist_cb;
+ cache->del_cb = cachefkcrt_del_cb;
+ cache->get_cb = cachefkcrt_get_cb;
+ cache->put_cb = cachefkcrt_put_cb;
+ cache->free_key_cb = cachefkcrt_free_key_cb;
+ cache->free_val_cb = cachefkcrt_free_val_cb;
+ cache->get_key_cb = cachefkcrt_get_key_cb;
+ cache->get_val_cb = cachefkcrt_get_val_cb;
+ cache->set_val_cb = cachefkcrt_set_val_cb;
+ cache->unpackverify_val_cb = cachefkcrt_unpackverify_val_cb;
+ cache->fini_cb = cachefkcrt_fini_cb;
+}
+
+cache_key_t
+cachefkcrt_mkkey(X509 *keycrt)
+{
+ unsigned char *fpr;
+
+ if (!(fpr = (unsigned char *)malloc(SSL_X509_FPRSZ)))
+ return NULL;
+ ssl_x509_fingerprint_sha1(keycrt, fpr);
+ return fpr;
+}
+
+cache_val_t
+cachefkcrt_mkval(X509 *valcrt)
+{
+ ssl_x509_refcount_inc(valcrt);
+ return valcrt;
+}
+
+/* vim: set noet ft=c: */