xref: /aosp_15_r20/external/curl/lib/vtls/keylog.c (revision 6236dae45794135f37c4eb022389c904c8b0090d)
1*6236dae4SAndroid Build Coastguard Worker /***************************************************************************
2*6236dae4SAndroid Build Coastguard Worker  *                                  _   _ ____  _
3*6236dae4SAndroid Build Coastguard Worker  *  Project                     ___| | | |  _ \| |
4*6236dae4SAndroid Build Coastguard Worker  *                             / __| | | | |_) | |
5*6236dae4SAndroid Build Coastguard Worker  *                            | (__| |_| |  _ <| |___
6*6236dae4SAndroid Build Coastguard Worker  *                             \___|\___/|_| \_\_____|
7*6236dae4SAndroid Build Coastguard Worker  *
8*6236dae4SAndroid Build Coastguard Worker  * Copyright (C) Daniel Stenberg, <[email protected]>, et al.
9*6236dae4SAndroid Build Coastguard Worker  *
10*6236dae4SAndroid Build Coastguard Worker  * This software is licensed as described in the file COPYING, which
11*6236dae4SAndroid Build Coastguard Worker  * you should have received as part of this distribution. The terms
12*6236dae4SAndroid Build Coastguard Worker  * are also available at https://curl.se/docs/copyright.html.
13*6236dae4SAndroid Build Coastguard Worker  *
14*6236dae4SAndroid Build Coastguard Worker  * You may opt to use, copy, modify, merge, publish, distribute and/or sell
15*6236dae4SAndroid Build Coastguard Worker  * copies of the Software, and permit persons to whom the Software is
16*6236dae4SAndroid Build Coastguard Worker  * furnished to do so, under the terms of the COPYING file.
17*6236dae4SAndroid Build Coastguard Worker  *
18*6236dae4SAndroid Build Coastguard Worker  * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
19*6236dae4SAndroid Build Coastguard Worker  * KIND, either express or implied.
20*6236dae4SAndroid Build Coastguard Worker  *
21*6236dae4SAndroid Build Coastguard Worker  * SPDX-License-Identifier: curl
22*6236dae4SAndroid Build Coastguard Worker  *
23*6236dae4SAndroid Build Coastguard Worker  ***************************************************************************/
24*6236dae4SAndroid Build Coastguard Worker #include "curl_setup.h"
25*6236dae4SAndroid Build Coastguard Worker 
26*6236dae4SAndroid Build Coastguard Worker #if defined(USE_OPENSSL) || \
27*6236dae4SAndroid Build Coastguard Worker   defined(USE_GNUTLS) || \
28*6236dae4SAndroid Build Coastguard Worker   defined(USE_WOLFSSL) || \
29*6236dae4SAndroid Build Coastguard Worker   (defined(USE_NGTCP2) && defined(USE_NGHTTP3)) || \
30*6236dae4SAndroid Build Coastguard Worker   defined(USE_QUICHE)
31*6236dae4SAndroid Build Coastguard Worker 
32*6236dae4SAndroid Build Coastguard Worker #include "keylog.h"
33*6236dae4SAndroid Build Coastguard Worker #include <curl/curl.h>
34*6236dae4SAndroid Build Coastguard Worker 
35*6236dae4SAndroid Build Coastguard Worker /* The last #include files should be: */
36*6236dae4SAndroid Build Coastguard Worker #include "curl_memory.h"
37*6236dae4SAndroid Build Coastguard Worker #include "memdebug.h"
38*6236dae4SAndroid Build Coastguard Worker 
39*6236dae4SAndroid Build Coastguard Worker #define KEYLOG_LABEL_MAXLEN (sizeof("CLIENT_HANDSHAKE_TRAFFIC_SECRET") - 1)
40*6236dae4SAndroid Build Coastguard Worker 
41*6236dae4SAndroid Build Coastguard Worker #define CLIENT_RANDOM_SIZE  32
42*6236dae4SAndroid Build Coastguard Worker 
43*6236dae4SAndroid Build Coastguard Worker /*
44*6236dae4SAndroid Build Coastguard Worker  * The master secret in TLS 1.2 and before is always 48 bytes. In TLS 1.3, the
45*6236dae4SAndroid Build Coastguard Worker  * secret size depends on the cipher suite's hash function which is 32 bytes
46*6236dae4SAndroid Build Coastguard Worker  * for SHA-256 and 48 bytes for SHA-384.
47*6236dae4SAndroid Build Coastguard Worker  */
48*6236dae4SAndroid Build Coastguard Worker #define SECRET_MAXLEN       48
49*6236dae4SAndroid Build Coastguard Worker 
50*6236dae4SAndroid Build Coastguard Worker 
51*6236dae4SAndroid Build Coastguard Worker /* The fp for the open SSLKEYLOGFILE, or NULL if not open */
52*6236dae4SAndroid Build Coastguard Worker static FILE *keylog_file_fp;
53*6236dae4SAndroid Build Coastguard Worker 
54*6236dae4SAndroid Build Coastguard Worker void
Curl_tls_keylog_open(void)55*6236dae4SAndroid Build Coastguard Worker Curl_tls_keylog_open(void)
56*6236dae4SAndroid Build Coastguard Worker {
57*6236dae4SAndroid Build Coastguard Worker   char *keylog_file_name;
58*6236dae4SAndroid Build Coastguard Worker 
59*6236dae4SAndroid Build Coastguard Worker   if(!keylog_file_fp) {
60*6236dae4SAndroid Build Coastguard Worker     keylog_file_name = curl_getenv("SSLKEYLOGFILE");
61*6236dae4SAndroid Build Coastguard Worker     if(keylog_file_name) {
62*6236dae4SAndroid Build Coastguard Worker       keylog_file_fp = fopen(keylog_file_name, FOPEN_APPENDTEXT);
63*6236dae4SAndroid Build Coastguard Worker       if(keylog_file_fp) {
64*6236dae4SAndroid Build Coastguard Worker #ifdef _WIN32
65*6236dae4SAndroid Build Coastguard Worker         if(setvbuf(keylog_file_fp, NULL, _IONBF, 0))
66*6236dae4SAndroid Build Coastguard Worker #else
67*6236dae4SAndroid Build Coastguard Worker         if(setvbuf(keylog_file_fp, NULL, _IOLBF, 4096))
68*6236dae4SAndroid Build Coastguard Worker #endif
69*6236dae4SAndroid Build Coastguard Worker         {
70*6236dae4SAndroid Build Coastguard Worker           fclose(keylog_file_fp);
71*6236dae4SAndroid Build Coastguard Worker           keylog_file_fp = NULL;
72*6236dae4SAndroid Build Coastguard Worker         }
73*6236dae4SAndroid Build Coastguard Worker       }
74*6236dae4SAndroid Build Coastguard Worker       Curl_safefree(keylog_file_name);
75*6236dae4SAndroid Build Coastguard Worker     }
76*6236dae4SAndroid Build Coastguard Worker   }
77*6236dae4SAndroid Build Coastguard Worker }
78*6236dae4SAndroid Build Coastguard Worker 
79*6236dae4SAndroid Build Coastguard Worker void
Curl_tls_keylog_close(void)80*6236dae4SAndroid Build Coastguard Worker Curl_tls_keylog_close(void)
81*6236dae4SAndroid Build Coastguard Worker {
82*6236dae4SAndroid Build Coastguard Worker   if(keylog_file_fp) {
83*6236dae4SAndroid Build Coastguard Worker     fclose(keylog_file_fp);
84*6236dae4SAndroid Build Coastguard Worker     keylog_file_fp = NULL;
85*6236dae4SAndroid Build Coastguard Worker   }
86*6236dae4SAndroid Build Coastguard Worker }
87*6236dae4SAndroid Build Coastguard Worker 
88*6236dae4SAndroid Build Coastguard Worker bool
Curl_tls_keylog_enabled(void)89*6236dae4SAndroid Build Coastguard Worker Curl_tls_keylog_enabled(void)
90*6236dae4SAndroid Build Coastguard Worker {
91*6236dae4SAndroid Build Coastguard Worker   return keylog_file_fp != NULL;
92*6236dae4SAndroid Build Coastguard Worker }
93*6236dae4SAndroid Build Coastguard Worker 
94*6236dae4SAndroid Build Coastguard Worker bool
Curl_tls_keylog_write_line(const char * line)95*6236dae4SAndroid Build Coastguard Worker Curl_tls_keylog_write_line(const char *line)
96*6236dae4SAndroid Build Coastguard Worker {
97*6236dae4SAndroid Build Coastguard Worker   /* The current maximum valid keylog line length LF and NUL is 195. */
98*6236dae4SAndroid Build Coastguard Worker   size_t linelen;
99*6236dae4SAndroid Build Coastguard Worker   char buf[256];
100*6236dae4SAndroid Build Coastguard Worker 
101*6236dae4SAndroid Build Coastguard Worker   if(!keylog_file_fp || !line) {
102*6236dae4SAndroid Build Coastguard Worker     return FALSE;
103*6236dae4SAndroid Build Coastguard Worker   }
104*6236dae4SAndroid Build Coastguard Worker 
105*6236dae4SAndroid Build Coastguard Worker   linelen = strlen(line);
106*6236dae4SAndroid Build Coastguard Worker   if(linelen == 0 || linelen > sizeof(buf) - 2) {
107*6236dae4SAndroid Build Coastguard Worker     /* Empty line or too big to fit in a LF and NUL. */
108*6236dae4SAndroid Build Coastguard Worker     return FALSE;
109*6236dae4SAndroid Build Coastguard Worker   }
110*6236dae4SAndroid Build Coastguard Worker 
111*6236dae4SAndroid Build Coastguard Worker   memcpy(buf, line, linelen);
112*6236dae4SAndroid Build Coastguard Worker   if(line[linelen - 1] != '\n') {
113*6236dae4SAndroid Build Coastguard Worker     buf[linelen++] = '\n';
114*6236dae4SAndroid Build Coastguard Worker   }
115*6236dae4SAndroid Build Coastguard Worker   buf[linelen] = '\0';
116*6236dae4SAndroid Build Coastguard Worker 
117*6236dae4SAndroid Build Coastguard Worker   /* Using fputs here instead of fprintf since libcurl's fprintf replacement
118*6236dae4SAndroid Build Coastguard Worker      may not be thread-safe. */
119*6236dae4SAndroid Build Coastguard Worker   fputs(buf, keylog_file_fp);
120*6236dae4SAndroid Build Coastguard Worker   return TRUE;
121*6236dae4SAndroid Build Coastguard Worker }
122*6236dae4SAndroid Build Coastguard Worker 
123*6236dae4SAndroid Build Coastguard Worker bool
Curl_tls_keylog_write(const char * label,const unsigned char client_random[CLIENT_RANDOM_SIZE],const unsigned char * secret,size_t secretlen)124*6236dae4SAndroid Build Coastguard Worker Curl_tls_keylog_write(const char *label,
125*6236dae4SAndroid Build Coastguard Worker                       const unsigned char client_random[CLIENT_RANDOM_SIZE],
126*6236dae4SAndroid Build Coastguard Worker                       const unsigned char *secret, size_t secretlen)
127*6236dae4SAndroid Build Coastguard Worker {
128*6236dae4SAndroid Build Coastguard Worker   const char *hex = "0123456789ABCDEF";
129*6236dae4SAndroid Build Coastguard Worker   size_t pos, i;
130*6236dae4SAndroid Build Coastguard Worker   char line[KEYLOG_LABEL_MAXLEN + 1 + 2 * CLIENT_RANDOM_SIZE + 1 +
131*6236dae4SAndroid Build Coastguard Worker             2 * SECRET_MAXLEN + 1 + 1];
132*6236dae4SAndroid Build Coastguard Worker 
133*6236dae4SAndroid Build Coastguard Worker   if(!keylog_file_fp) {
134*6236dae4SAndroid Build Coastguard Worker     return FALSE;
135*6236dae4SAndroid Build Coastguard Worker   }
136*6236dae4SAndroid Build Coastguard Worker 
137*6236dae4SAndroid Build Coastguard Worker   pos = strlen(label);
138*6236dae4SAndroid Build Coastguard Worker   if(pos > KEYLOG_LABEL_MAXLEN || !secretlen || secretlen > SECRET_MAXLEN) {
139*6236dae4SAndroid Build Coastguard Worker     /* Should never happen - sanity check anyway. */
140*6236dae4SAndroid Build Coastguard Worker     return FALSE;
141*6236dae4SAndroid Build Coastguard Worker   }
142*6236dae4SAndroid Build Coastguard Worker 
143*6236dae4SAndroid Build Coastguard Worker   memcpy(line, label, pos);
144*6236dae4SAndroid Build Coastguard Worker   line[pos++] = ' ';
145*6236dae4SAndroid Build Coastguard Worker 
146*6236dae4SAndroid Build Coastguard Worker   /* Client Random */
147*6236dae4SAndroid Build Coastguard Worker   for(i = 0; i < CLIENT_RANDOM_SIZE; i++) {
148*6236dae4SAndroid Build Coastguard Worker     line[pos++] = hex[client_random[i] >> 4];
149*6236dae4SAndroid Build Coastguard Worker     line[pos++] = hex[client_random[i] & 0xF];
150*6236dae4SAndroid Build Coastguard Worker   }
151*6236dae4SAndroid Build Coastguard Worker   line[pos++] = ' ';
152*6236dae4SAndroid Build Coastguard Worker 
153*6236dae4SAndroid Build Coastguard Worker   /* Secret */
154*6236dae4SAndroid Build Coastguard Worker   for(i = 0; i < secretlen; i++) {
155*6236dae4SAndroid Build Coastguard Worker     line[pos++] = hex[secret[i] >> 4];
156*6236dae4SAndroid Build Coastguard Worker     line[pos++] = hex[secret[i] & 0xF];
157*6236dae4SAndroid Build Coastguard Worker   }
158*6236dae4SAndroid Build Coastguard Worker   line[pos++] = '\n';
159*6236dae4SAndroid Build Coastguard Worker   line[pos] = '\0';
160*6236dae4SAndroid Build Coastguard Worker 
161*6236dae4SAndroid Build Coastguard Worker   /* Using fputs here instead of fprintf since libcurl's fprintf replacement
162*6236dae4SAndroid Build Coastguard Worker      may not be thread-safe. */
163*6236dae4SAndroid Build Coastguard Worker   fputs(line, keylog_file_fp);
164*6236dae4SAndroid Build Coastguard Worker   return TRUE;
165*6236dae4SAndroid Build Coastguard Worker }
166*6236dae4SAndroid Build Coastguard Worker 
167*6236dae4SAndroid Build Coastguard Worker #endif  /* TLS or QUIC backend */
168