1 /*
2  * dnstap/unbound-dnstap-socket.c - debug program that listens for DNSTAP logs.
3  *
4  * Copyright (c) 2020, NLnet Labs. All rights reserved.
5  *
6  * This software is open source.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * Redistributions of source code must retain the above copyright notice,
13  * this list of conditions and the following disclaimer.
14  *
15  * Redistributions in binary form must reproduce the above copyright notice,
16  * this list of conditions and the following disclaimer in the documentation
17  * and/or other materials provided with the distribution.
18  *
19  * Neither the name of the NLNET LABS nor the names of its contributors may
20  * be used to endorse or promote products derived from this software without
21  * specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
26  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
27  * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
28  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
29  * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
30  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34  */
35 
36 /**
37  * \file
38  *
39  * This program listens on a DNSTAP socket for logged messages.
40  */
41 #include "config.h"
42 #ifdef HAVE_GETOPT_H
43 #include <getopt.h>
44 #endif
45 #include <signal.h>
46 #include <stdlib.h>
47 #include <unistd.h>
48 #include <signal.h>
49 #include <ctype.h>
50 #ifdef HAVE_SYS_UN_H
51 #include <sys/un.h>
52 #endif
53 #include <openssl/ssl.h>
54 #include <openssl/rand.h>
55 #include <openssl/err.h>
56 #include "dnstap/dtstream.h"
57 #include "dnstap/dnstap_fstrm.h"
58 #include "util/log.h"
59 #include "util/ub_event.h"
60 #include "util/net_help.h"
61 #include "services/listen_dnsport.h"
62 #include "sldns/sbuffer.h"
63 #include "sldns/wire2str.h"
64 #ifdef USE_DNSTAP
65 #include <protobuf-c/protobuf-c.h>
66 #include "dnstap/dnstap.pb-c.h"
67 #endif /* USE_DNSTAP */
68 #include "util/config_file.h"
69 
70 /** listen backlog on TCP connections for dnstap logs */
71 #define LISTEN_BACKLOG 16
72 
73 /** usage information for streamtcp */
74 static void usage(char* argv[])
75 {
76 	printf("usage: %s [options]\n", argv[0]);
77 	printf(" 	Listen to dnstap messages\n");
78 	printf("stdout has dnstap log, stderr has verbose server log\n");
79 	printf("-u <socketpath> listen to unix socket with this file name\n");
80 	printf("-s <serverip[@port]> listen for TCP on the IP and port\n");
81 	printf("-t <serverip[@port]> listen for TLS on IP and port\n");
82 	printf("-x <server.key> server key file for TLS service\n");
83 	printf("-y <server.pem> server cert file for TLS service\n");
84 	printf("-z <verify.pem> cert file to verify client connections\n");
85 	printf("-l 		long format for DNS printout\n");
86 	printf("-v 		more verbose log output\n");
87 	printf("-h 		this help text\n");
88 	exit(1);
89 }
90 
91 /** long format option, for multiline printout per message */
92 static int longformat = 0;
93 
94 struct tap_socket_list;
95 struct tap_socket;
96 /** main tap callback data */
97 struct main_tap_data {
98 	/** the event base (to loopexit) */
99 	struct ub_event_base* base;
100 	/** the list of accept sockets */
101 	struct tap_socket_list* acceptlist;
102 };
103 
104 /** tap callback variables */
105 struct tap_data {
106 	/** the fd */
107 	int fd;
108 	/** the ub event */
109 	struct ub_event* ev;
110 	/** the SSL for TLS streams */
111 	SSL* ssl;
112 	/** is the ssl handshake done */
113 	int ssl_handshake_done;
114 	/** we are briefly waiting to write (in the struct event) */
115 	int ssl_brief_write;
116 	/** string that identifies the socket (or NULL), like IP address */
117 	char* id;
118 	/** have we read the length, and how many bytes of it */
119 	int len_done;
120 	/** have we read the data, and how many bytes of it */
121 	size_t data_done;
122 	/** are we reading a control frame */
123 	int control_frame;
124 	/** are we bi-directional (if false, uni-directional) */
125 	int is_bidirectional;
126 	/** data of the frame */
127 	uint8_t* frame;
128 	/** length of this frame */
129 	size_t len;
130 };
131 
132 /** list of sockets */
133 struct tap_socket_list {
134 	/** next in list */
135 	struct tap_socket_list* next;
136 	/** the socket */
137 	struct tap_socket* s;
138 };
139 
140 /** tap socket */
141 struct tap_socket {
142 	/** fd of socket */
143 	int fd;
144 	/** the event for it */
145 	struct ub_event *ev;
146 	/** has the event been added */
147 	int ev_added;
148 	/** the callback, for the event, ev_cb(fd, bits, arg) */
149 	void (*ev_cb)(int, short, void*);
150 	/** data element, (arg for the tap_socket struct) */
151 	void* data;
152 	/** socketpath, if this is an AF_LOCAL socket */
153 	char* socketpath;
154 	/** IP, if this is a TCP socket */
155 	char* ip;
156 	/** for a TLS socket, the tls context */
157 	SSL_CTX* sslctx;
158 };
159 
160 /** del the tap event */
161 static void tap_socket_delev(struct tap_socket* s)
162 {
163 	if(!s) return;
164 	if(!s->ev) return;
165 	if(!s->ev_added) return;
166 	ub_event_del(s->ev);
167 	s->ev_added = 0;
168 }
169 
170 /** close the tap socket */
171 static void tap_socket_close(struct tap_socket* s)
172 {
173 	if(!s) return;
174 	if(s->fd == -1) return;
175 	close(s->fd);
176 	s->fd = -1;
177 }
178 
179 /** delete tap socket */
180 static void tap_socket_delete(struct tap_socket* s)
181 {
182 	if(!s) return;
183 #ifdef HAVE_SSL
184 	SSL_CTX_free(s->sslctx);
185 #endif
186 	ub_event_free(s->ev);
187 	free(s->socketpath);
188 	free(s->ip);
189 	free(s);
190 }
191 
192 /** create new socket (unconnected, not base-added), or NULL malloc fail */
193 static struct tap_socket* tap_socket_new_local(char* socketpath,
194 	void (*ev_cb)(int, short, void*), void* data)
195 {
196 	struct tap_socket* s = calloc(1, sizeof(*s));
197 	if(!s) {
198 		log_err("malloc failure");
199 		return NULL;
200 	}
201 	s->socketpath = strdup(socketpath);
202 	if(!s->socketpath) {
203 		free(s);
204 		log_err("malloc failure");
205 		return NULL;
206 	}
207 	s->fd = -1;
208 	s->ev_cb = ev_cb;
209 	s->data = data;
210 	return s;
211 }
212 
213 /** create new socket (unconnected, not base-added), or NULL malloc fail */
214 static struct tap_socket* tap_socket_new_tcpaccept(char* ip,
215 	void (*ev_cb)(int, short, void*), void* data)
216 {
217 	struct tap_socket* s = calloc(1, sizeof(*s));
218 	if(!s) {
219 		log_err("malloc failure");
220 		return NULL;
221 	}
222 	s->ip = strdup(ip);
223 	if(!s->ip) {
224 		free(s);
225 		log_err("malloc failure");
226 		return NULL;
227 	}
228 	s->fd = -1;
229 	s->ev_cb = ev_cb;
230 	s->data = data;
231 	return s;
232 }
233 
234 /** create new socket (unconnected, not base-added), or NULL malloc fail */
235 static struct tap_socket* tap_socket_new_tlsaccept(char* ip,
236 	void (*ev_cb)(int, short, void*), void* data, char* server_key,
237 	char* server_cert, char* verifypem)
238 {
239 	struct tap_socket* s = calloc(1, sizeof(*s));
240 	if(!s) {
241 		log_err("malloc failure");
242 		return NULL;
243 	}
244 	s->ip = strdup(ip);
245 	if(!s->ip) {
246 		free(s);
247 		log_err("malloc failure");
248 		return NULL;
249 	}
250 	s->fd = -1;
251 	s->ev_cb = ev_cb;
252 	s->data = data;
253 	s->sslctx = listen_sslctx_create(server_key, server_cert, verifypem);
254 	if(!s->sslctx) {
255 		log_err("could not create ssl context");
256 		free(s->ip);
257 		free(s);
258 		return NULL;
259 	}
260 	return s;
261 }
262 
263 /** setup tcp accept socket on IP string */
264 static int make_tcp_accept(char* ip)
265 {
266 #ifdef SO_REUSEADDR
267 	int on = 1;
268 #endif
269 	struct sockaddr_storage addr;
270 	socklen_t len;
271 	int s;
272 
273 	memset(&addr, 0, sizeof(addr));
274 	len = (socklen_t)sizeof(addr);
275 	if(!extstrtoaddr(ip, &addr, &len)) {
276 		log_err("could not parse IP '%s'", ip);
277 		return -1;
278 	}
279 
280 	if((s = socket(addr.ss_family, SOCK_STREAM, 0)) == -1) {
281 		log_err("can't create socket: %s", sock_strerror(errno));
282 		return -1;
283 	}
284 #ifdef SO_REUSEADDR
285 	if(setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (void*)&on,
286 		(socklen_t)sizeof(on)) < 0) {
287 		log_err("setsockopt(.. SO_REUSEADDR ..) failed: %s",
288 			sock_strerror(errno));
289 		sock_close(s);
290 		return -1;
291 	}
292 #endif /* SO_REUSEADDR */
293 	if(bind(s, (struct sockaddr*)&addr, len) != 0) {
294 		log_err_addr("can't bind socket", sock_strerror(errno),
295 			&addr, len);
296 		sock_close(s);
297 		return -1;
298 	}
299 	if(!fd_set_nonblock(s)) {
300 		sock_close(s);
301 		return -1;
302 	}
303 	if(listen(s, LISTEN_BACKLOG) == -1) {
304 		log_err("can't listen: %s", sock_strerror(errno));
305 		sock_close(s);
306 		return -1;
307 	}
308 	return s;
309 }
310 
311 /** setup socket on event base */
312 static int tap_socket_setup(struct tap_socket* s, struct ub_event_base* base)
313 {
314 	if(s->socketpath) {
315 		/* AF_LOCAL accept socket */
316 		s->fd = create_local_accept_sock(s->socketpath, NULL, 0);
317 		if(s->fd == -1) {
318 			log_err("could not create local socket");
319 			return 0;
320 		}
321 	} else if(s->ip || s->sslctx) {
322 		/* TCP accept socket */
323 		s->fd = make_tcp_accept(s->ip);
324 		if(s->fd == -1) {
325 			log_err("could not create tcp socket");
326 			return 0;
327 		}
328 	}
329 	s->ev = ub_event_new(base, s->fd, UB_EV_READ | UB_EV_PERSIST,
330 		s->ev_cb, s);
331 	if(!s->ev) {
332 		log_err("could not ub_event_new");
333 		return 0;
334 	}
335 	if(ub_event_add(s->ev, NULL) != 0) {
336 		log_err("could not ub_event_add");
337 		return 0;
338 	}
339 	s->ev_added = 1;
340 	return 1;
341 }
342 
343 /** add tap socket to list */
344 static int tap_socket_list_insert(struct tap_socket_list** liststart,
345 	struct tap_socket* s)
346 {
347 	struct tap_socket_list* entry = (struct tap_socket_list*)
348 		malloc(sizeof(*entry));
349 	if(!entry)
350 		return 0;
351 	entry->next = *liststart;
352 	entry->s = s;
353 	*liststart = entry;
354 	return 1;
355 }
356 
357 /** delete the list */
358 static void tap_socket_list_delete(struct tap_socket_list* list)
359 {
360 	struct tap_socket_list* e = list, *next;
361 	while(e) {
362 		next = e->next;
363 		tap_socket_delev(e->s);
364 		tap_socket_close(e->s);
365 		tap_socket_delete(e->s);
366 		free(e);
367 		e = next;
368 	}
369 }
370 
371 /** setup accept events */
372 static int tap_socket_list_addevs(struct tap_socket_list* list,
373 	struct ub_event_base* base)
374 {
375 	struct tap_socket_list* entry;
376 	for(entry = list; entry; entry = entry->next) {
377 		if(!tap_socket_setup(entry->s, base)) {
378 			log_err("could not setup socket");
379 			return 0;
380 		}
381 	}
382 	return 1;
383 }
384 
385 #ifdef USE_DNSTAP
386 /** log control frame contents */
387 static void log_control_frame(uint8_t* pkt, size_t len)
388 {
389 	char* desc;
390 	if(verbosity == 0) return;
391 	desc = fstrm_describe_control(pkt, len);
392 	if(!desc) {
393 		log_err("out of memory");
394 		return;
395 	}
396 	log_info("control frame %s", desc);
397 	free(desc);
398 }
399 
400 /** convert mtype to string */
401 static const char* mtype_to_str(enum _Dnstap__Message__Type mtype)
402 {
403 	switch(mtype) {
404 		case DNSTAP__MESSAGE__TYPE__AUTH_QUERY:
405 			return "AUTH_QUERY";
406 		case DNSTAP__MESSAGE__TYPE__AUTH_RESPONSE:
407 			return "AUTH_RESPONSE";
408 		case DNSTAP__MESSAGE__TYPE__RESOLVER_QUERY:
409 			return "RESOLVER_QUERY";
410 		case DNSTAP__MESSAGE__TYPE__RESOLVER_RESPONSE:
411 			return "RESOLVER_RESPONSE";
412 		case DNSTAP__MESSAGE__TYPE__CLIENT_QUERY:
413 			return "CLIENT_QUERY";
414 		case DNSTAP__MESSAGE__TYPE__CLIENT_RESPONSE:
415 			return "CLIENT_RESPONSE";
416 		case DNSTAP__MESSAGE__TYPE__FORWARDER_QUERY:
417 			return "FORWARDER_QUERY";
418 		case DNSTAP__MESSAGE__TYPE__FORWARDER_RESPONSE:
419 			return "FORWARDER_RESPONSE";
420 		case DNSTAP__MESSAGE__TYPE__STUB_QUERY:
421 			return "STUB_QUERY";
422 		case DNSTAP__MESSAGE__TYPE__STUB_RESPONSE:
423 			return "STUB_RESPONSE";
424 		default: break;
425 	}
426 	return "unknown_message_type";
427 }
428 
429 /** convert type address to a string ip4 or ip6, malloced or NULL on fail */
430 static char* str_of_addr(ProtobufCBinaryData address)
431 {
432 	char buf[64];
433 	socklen_t len = sizeof(buf);
434 	if(address.len == 4) {
435 		if(inet_ntop(AF_INET, address.data, buf, len)!=0)
436 			return strdup(buf);
437 	} else if(address.len == 16) {
438 		if(inet_ntop(AF_INET6, address.data, buf, len)!=0)
439 			return strdup(buf);
440 	}
441 	return NULL;
442 }
443 
444 /** convert message buffer (of dns bytes) to the first qname, type, class,
445  * malloced or NULL on fail */
446 static char* q_of_msg(ProtobufCBinaryData message)
447 {
448 	char buf[300];
449 	/* header, name, type, class minimum to get the query tuple */
450 	if(message.len < 12 + 1 + 4 + 4) return NULL;
451 	if(sldns_wire2str_rrquestion_buf(message.data+12, message.len-12,
452 		buf, sizeof(buf)) != 0) {
453 		/* remove trailing newline, tabs to spaces */
454 		/* remove the newline: */
455 		if(buf[0] != 0) buf[strlen(buf)-1]=0;
456 		/* remove first tab (before type) */
457 		if(strrchr(buf, '\t')) *strrchr(buf, '\t')=' ';
458 		/* remove second tab (before class) */
459 		if(strrchr(buf, '\t')) *strrchr(buf, '\t')=' ';
460 		return strdup(buf);
461 	}
462 	return NULL;
463 }
464 
465 /** convert possible string or hex data to string. malloced or NULL */
466 static char* possible_str(ProtobufCBinaryData str)
467 {
468 	int is_str = 1;
469 	size_t i;
470 	for(i=0; i<str.len; i++) {
471 		if(!isprint((unsigned char)str.data[i]))
472 			is_str = 0;
473 	}
474 	if(is_str) {
475 		char* res = malloc(str.len+1);
476 		if(res) {
477 			memmove(res, str.data, str.len);
478 			res[str.len] = 0;
479 			return res;
480 		}
481 	} else {
482 		const char* hex = "0123456789ABCDEF";
483 		char* res = malloc(str.len*2+1);
484 		if(res) {
485 			for(i=0; i<str.len; i++) {
486 				res[i*2] = hex[(str.data[i]&0xf0)>>4];
487 				res[i*2+1] = hex[str.data[i]&0x0f];
488 			}
489 			res[str.len*2] = 0;
490 			return res;
491 		}
492 	}
493 	return NULL;
494 }
495 
496 /** convert timeval to string, malloced or NULL */
497 static char* tv_to_str(protobuf_c_boolean has_time_sec, uint64_t time_sec,
498 	protobuf_c_boolean has_time_nsec, uint32_t time_nsec)
499 {
500 	char buf[64], buf2[256];
501 	struct timeval tv;
502 	time_t time_t_sec;
503 	memset(&tv, 0, sizeof(tv));
504 	if(has_time_sec) tv.tv_sec = time_sec;
505 	if(has_time_nsec) tv.tv_usec = time_nsec;
506 
507 	buf[0]=0;
508 	time_t_sec = tv.tv_sec;
509 	(void)ctime_r(&time_t_sec, buf);
510 	snprintf(buf2, sizeof(buf2), "%u.%9.9u %s",
511 		(unsigned)time_sec, (unsigned)time_nsec, buf);
512 	return strdup(buf2);
513 }
514 
515 /** log data frame contents */
516 static void log_data_frame(uint8_t* pkt, size_t len)
517 {
518 	Dnstap__Dnstap* d = dnstap__dnstap__unpack(NULL, len, pkt);
519 	const char* mtype = NULL;
520 	char* maddr=NULL, *qinf=NULL;
521 	if(!d) {
522 		log_err("could not unpack");
523 		return;
524 	}
525 	if(d->base.descriptor != &dnstap__dnstap__descriptor) {
526 		log_err("wrong base descriptor");
527 		dnstap__dnstap__free_unpacked(d, NULL);
528 		return;
529 	}
530 	if(d->type != DNSTAP__DNSTAP__TYPE__MESSAGE) {
531 		log_err("dnstap type not type_message");
532 		dnstap__dnstap__free_unpacked(d, NULL);
533 		return;
534 	}
535 	if(d->message) {
536 		mtype = mtype_to_str(d->message->type);
537 		if(d->message->has_query_address)
538 			maddr = str_of_addr(d->message->query_address);
539 		else if(d->message->has_response_address)
540 			maddr = str_of_addr(d->message->response_address);
541 		if(d->message->has_query_message)
542 			qinf = q_of_msg(d->message->query_message);
543 		else if(d->message->has_response_message)
544 			qinf = q_of_msg(d->message->response_message);
545 
546 	} else {
547 		mtype = "nomessage";
548 	}
549 
550 	printf("%s%s%s%s%s\n", mtype, (maddr?" ":""), (maddr?maddr:""),
551 		(qinf?" ":""), (qinf?qinf:""));
552 	free(maddr);
553 	free(qinf);
554 
555 	if(longformat) {
556 		char* id=NULL, *vs=NULL;
557 		if(d->has_identity) {
558 			id=possible_str(d->identity);
559 		}
560 		if(d->has_version) {
561 			vs=possible_str(d->version);
562 		}
563 		if(id || vs)
564 			printf("identity: %s%s%s\n", (id?id:""),
565 				(id&&vs?" ":""), (vs?vs:""));
566 		free(id);
567 		free(vs);
568 
569 		if(d->message && d->message->has_query_message &&
570 			d->message->query_message.data) {
571 			char* qmsg = sldns_wire2str_pkt(
572 				d->message->query_message.data,
573 				d->message->query_message.len);
574 			if(qmsg) {
575 				printf("query_message:\n%s", qmsg);
576 				free(qmsg);
577 			}
578 		}
579 		if(d->message && d->message->has_query_time_sec) {
580 			char* qtv = tv_to_str(d->message->has_query_time_sec,
581 				d->message->query_time_sec,
582 				d->message->has_query_time_nsec,
583 				d->message->query_time_nsec);
584 			if(qtv) {
585 				printf("query_time: %s\n", qtv);
586 				free(qtv);
587 			}
588 		}
589 		if(d->message && d->message->has_response_message &&
590 			d->message->response_message.data) {
591 			char* rmsg = sldns_wire2str_pkt(
592 				d->message->response_message.data,
593 				d->message->response_message.len);
594 			if(rmsg) {
595 				printf("response_message:\n%s", rmsg);
596 				free(rmsg);
597 			}
598 		}
599 		if(d->message && d->message->has_response_time_sec) {
600 			char* rtv = tv_to_str(d->message->has_response_time_sec,
601 				d->message->response_time_sec,
602 				d->message->has_response_time_nsec,
603 				d->message->response_time_nsec);
604 			if(rtv) {
605 				printf("response_time: %s\n", rtv);
606 				free(rtv);
607 			}
608 		}
609 	}
610 	fflush(stdout);
611 	dnstap__dnstap__free_unpacked(d, NULL);
612 }
613 #endif /* USE_DNSTAP */
614 
615 /** receive bytes from fd, prints errors if bad,
616  * returns 0: closed/error, -1: continue, >0 number of bytes */
617 static ssize_t receive_bytes(struct tap_data* data, int fd, void* buf,
618 	size_t len)
619 {
620 	ssize_t ret = recv(fd, buf, len, 0);
621 	if(ret == 0) {
622 		/* closed */
623 		if(verbosity) log_info("dnstap client stream closed from %s",
624 			(data->id?data->id:""));
625 		return 0;
626 	} else if(ret == -1) {
627 		/* error */
628 #ifndef USE_WINSOCK
629 		if(errno == EINTR || errno == EAGAIN)
630 			return -1;
631 #else /* USE_WINSOCK */
632 		if(WSAGetLastError() == WSAEINPROGRESS)
633 			return -1;
634 		if(WSAGetLastError() == WSAEWOULDBLOCK) {
635 			ub_winsock_tcp_wouldblock(data->ev, UB_EV_READ);
636 			return -1;
637 		}
638 #endif
639 		log_err("could not recv: %s", sock_strerror(errno));
640 		if(verbosity) log_info("dnstap client stream closed from %s",
641 			(data->id?data->id:""));
642 		return 0;
643 	}
644 	return ret;
645 }
646 
647 /* define routine for have_ssl only to avoid unused function warning */
648 #ifdef HAVE_SSL
649 /** set to wait briefly for a write event, for one event call */
650 static void tap_enable_brief_write(struct tap_data* data)
651 {
652 	ub_event_del(data->ev);
653 	ub_event_del_bits(data->ev, UB_EV_READ);
654 	ub_event_add_bits(data->ev, UB_EV_WRITE);
655 	if(ub_event_add(data->ev, NULL) != 0)
656 		log_err("could not ub_event_add in tap_enable_brief_write");
657 	data->ssl_brief_write = 1;
658 }
659 #endif /* HAVE_SSL */
660 
661 /* define routine for have_ssl only to avoid unused function warning */
662 #ifdef HAVE_SSL
663 /** stop the brief wait for a write event. back to reading. */
664 static void tap_disable_brief_write(struct tap_data* data)
665 {
666 	ub_event_del(data->ev);
667 	ub_event_del_bits(data->ev, UB_EV_WRITE);
668 	ub_event_add_bits(data->ev, UB_EV_READ);
669 	if(ub_event_add(data->ev, NULL) != 0)
670 		log_err("could not ub_event_add in tap_disable_brief_write");
671 	data->ssl_brief_write = 0;
672 }
673 #endif /* HAVE_SSL */
674 
675 #ifdef HAVE_SSL
676 /** receive bytes over ssl stream, prints errors if bad,
677  * returns 0: closed/error, -1: continue, >0 number of bytes */
678 static ssize_t ssl_read_bytes(struct tap_data* data, void* buf, size_t len)
679 {
680 	int r;
681 	ERR_clear_error();
682 	r = SSL_read(data->ssl, buf, len);
683 	if(r <= 0) {
684 		int want = SSL_get_error(data->ssl, r);
685 		if(want == SSL_ERROR_ZERO_RETURN) {
686 			/* closed */
687 			if(verbosity) log_info("dnstap client stream closed from %s",
688 				(data->id?data->id:""));
689 			return 0;
690 		} else if(want == SSL_ERROR_WANT_READ) {
691 			/* continue later */
692 			return -1;
693 		} else if(want == SSL_ERROR_WANT_WRITE) {
694 			/* set to briefly write */
695 			tap_enable_brief_write(data);
696 			return -1;
697 		} else if(want == SSL_ERROR_SYSCALL) {
698 #ifdef ECONNRESET
699 			if(errno == ECONNRESET && verbosity < 2)
700 				return 0; /* silence reset by peer */
701 #endif
702 			if(errno != 0)
703 				log_err("SSL_read syscall: %s",
704 					strerror(errno));
705 			if(verbosity) log_info("dnstap client stream closed from %s",
706 				(data->id?data->id:""));
707 			return 0;
708 		}
709 		log_crypto_err("could not SSL_read");
710 		if(verbosity) log_info("dnstap client stream closed from %s",
711 			(data->id?data->id:""));
712 		return 0;
713 	}
714 	return r;
715 }
716 #endif /* HAVE_SSL */
717 
718 /** receive bytes on the tap connection, prints errors if bad,
719  * returns 0: closed/error, -1: continue, >0 number of bytes */
720 static ssize_t tap_receive(struct tap_data* data, void* buf, size_t len)
721 {
722 #ifdef HAVE_SSL
723 	if(data->ssl)
724 		return ssl_read_bytes(data, buf, len);
725 #endif
726 	return receive_bytes(data, data->fd, buf, len);
727 }
728 
729 /** delete the tap structure */
730 static void tap_data_free(struct tap_data* data)
731 {
732 	ub_event_del(data->ev);
733 	ub_event_free(data->ev);
734 #ifdef HAVE_SSL
735 	SSL_free(data->ssl);
736 #endif
737 	close(data->fd);
738 	free(data->id);
739 	free(data->frame);
740 	free(data);
741 }
742 
743 /** reply with ACCEPT control frame to bidirectional client,
744  * returns 0 on error */
745 static int reply_with_accept(struct tap_data* data)
746 {
747 #ifdef USE_DNSTAP
748 	/* len includes the escape and framelength */
749 	int r;
750 	size_t len = 0;
751 	void* acceptframe = fstrm_create_control_frame_accept(
752 		DNSTAP_CONTENT_TYPE, &len);
753 	if(!acceptframe) {
754 		log_err("out of memory");
755 		return 0;
756 	}
757 
758 	fd_set_block(data->fd);
759 	if(data->ssl) {
760 		if((r=SSL_write(data->ssl, acceptframe, len)) <= 0) {
761 			if(SSL_get_error(data->ssl, r) == SSL_ERROR_ZERO_RETURN)
762 				log_err("SSL_write, peer closed connection");
763 			else
764 				log_err("could not SSL_write");
765 			fd_set_nonblock(data->fd);
766 			free(acceptframe);
767 			return 0;
768 		}
769 	} else {
770 		if(send(data->fd, acceptframe, len, 0) == -1) {
771 			log_err("send failed: %s", sock_strerror(errno));
772 			fd_set_nonblock(data->fd);
773 			free(acceptframe);
774 			return 0;
775 		}
776 	}
777 	if(verbosity) log_info("sent control frame(accept) content-type:(%s)",
778 			DNSTAP_CONTENT_TYPE);
779 
780 	fd_set_nonblock(data->fd);
781 	free(acceptframe);
782 	return 1;
783 #else
784 	log_err("no dnstap compiled, no reply");
785 	(void)data;
786 	return 0;
787 #endif
788 }
789 
790 /** reply with FINISH control frame to bidirectional client,
791  * returns 0 on error */
792 static int reply_with_finish(int fd)
793 {
794 #ifdef USE_DNSTAP
795 	size_t len = 0;
796 	void* finishframe = fstrm_create_control_frame_finish(&len);
797 	if(!finishframe) {
798 		log_err("out of memory");
799 		return 0;
800 	}
801 
802 	fd_set_block(fd);
803 	if(send(fd, finishframe, len, 0) == -1) {
804 		log_err("send failed: %s", sock_strerror(errno));
805 		fd_set_nonblock(fd);
806 		free(finishframe);
807 		return 0;
808 	}
809 	if(verbosity) log_info("sent control frame(finish)");
810 
811 	fd_set_nonblock(fd);
812 	free(finishframe);
813 	return 1;
814 #else
815 	log_err("no dnstap compiled, no reply");
816 	(void)fd;
817 	return 0;
818 #endif
819 }
820 
821 #ifdef HAVE_SSL
822 /** check SSL peer certificate, return 0 on fail */
823 static int tap_check_peer(struct tap_data* data)
824 {
825 	if((SSL_get_verify_mode(data->ssl)&SSL_VERIFY_PEER)) {
826 		/* verification */
827 		if(SSL_get_verify_result(data->ssl) == X509_V_OK) {
828 			X509* x = SSL_get_peer_certificate(data->ssl);
829 			if(!x) {
830 				if(verbosity) log_info("SSL connection %s"
831 					" failed no certificate", data->id);
832 				return 0;
833 			}
834 			if(verbosity)
835 				log_cert(VERB_ALGO, "peer certificate", x);
836 #ifdef HAVE_SSL_GET0_PEERNAME
837 			if(SSL_get0_peername(data->ssl)) {
838 				if(verbosity) log_info("SSL connection %s "
839 					"to %s authenticated", data->id,
840 					SSL_get0_peername(data->ssl));
841 			} else {
842 #endif
843 				if(verbosity) log_info("SSL connection %s "
844 					"authenticated", data->id);
845 #ifdef HAVE_SSL_GET0_PEERNAME
846 			}
847 #endif
848 			X509_free(x);
849 		} else {
850 			X509* x = SSL_get_peer_certificate(data->ssl);
851 			if(x) {
852 				if(verbosity)
853 					log_cert(VERB_ALGO, "peer certificate", x);
854 				X509_free(x);
855 			}
856 			if(verbosity) log_info("SSL connection %s failed: "
857 				"failed to authenticate", data->id);
858 			return 0;
859 		}
860 	} else {
861 		/* unauthenticated, the verify peer flag was not set
862 		 * in ssl when the ssl object was created from ssl_ctx */
863 		if(verbosity) log_info("SSL connection %s", data->id);
864 	}
865 	return 1;
866 }
867 #endif /* HAVE_SSL */
868 
869 #ifdef HAVE_SSL
870 /** perform SSL handshake, return 0 to wait for events, 1 if done */
871 static int tap_handshake(struct tap_data* data)
872 {
873 	int r;
874 	if(data->ssl_brief_write) {
875 		/* write condition has been satisfied, back to reading */
876 		tap_disable_brief_write(data);
877 	}
878 	if(data->ssl_handshake_done)
879 		return 1;
880 
881 	ERR_clear_error();
882 	r = SSL_do_handshake(data->ssl);
883 	if(r != 1) {
884 		int want = SSL_get_error(data->ssl, r);
885 		if(want == SSL_ERROR_WANT_READ) {
886 			return 0;
887 		} else if(want == SSL_ERROR_WANT_WRITE) {
888 			tap_enable_brief_write(data);
889 			return 0;
890 		} else if(r == 0) {
891 			/* closed */
892 			tap_data_free(data);
893 			return 0;
894 		} else if(want == SSL_ERROR_SYSCALL) {
895 			/* SYSCALL and errno==0 means closed uncleanly */
896 			int silent = 0;
897 #ifdef EPIPE
898 			if(errno == EPIPE && verbosity < 2)
899 				silent = 1; /* silence 'broken pipe' */
900 #endif
901 #ifdef ECONNRESET
902 			if(errno == ECONNRESET && verbosity < 2)
903 				silent = 1; /* silence reset by peer */
904 #endif
905 			if(errno == 0)
906 				silent = 1;
907 			if(!silent)
908 				log_err("SSL_handshake syscall: %s",
909 					strerror(errno));
910 			tap_data_free(data);
911 			return 0;
912 		} else {
913 			unsigned long err = ERR_get_error();
914 			if(!squelch_err_ssl_handshake(err)) {
915 				log_crypto_err_code("ssl handshake failed",
916 					err);
917 				verbose(VERB_OPS, "ssl handshake failed "
918 					"from %s", data->id);
919 			}
920 			tap_data_free(data);
921 			return 0;
922 		}
923 	}
924 	/* check peer verification */
925 	data->ssl_handshake_done = 1;
926 	if(!tap_check_peer(data)) {
927 		/* closed */
928 		tap_data_free(data);
929 		return 0;
930 	}
931 	return 1;
932 }
933 #endif /* HAVE_SSL */
934 
935 /** callback for dnstap listener */
936 void dtio_tap_callback(int fd, short ATTR_UNUSED(bits), void* arg)
937 {
938 	struct tap_data* data = (struct tap_data*)arg;
939 	if(verbosity>=3) log_info("tap callback");
940 #ifdef HAVE_SSL
941 	if(data->ssl && (!data->ssl_handshake_done ||
942 		data->ssl_brief_write)) {
943 		if(!tap_handshake(data))
944 			return;
945 	}
946 #endif
947 	while(data->len_done < 4) {
948 		uint32_t l = (uint32_t)data->len;
949 		ssize_t ret = tap_receive(data,
950 			((uint8_t*)&l)+data->len_done, 4-data->len_done);
951 		if(verbosity>=4) log_info("s recv %d", (int)ret);
952 		if(ret == 0) {
953 			/* closed or error */
954 			tap_data_free(data);
955 			return;
956 		} else if(ret == -1) {
957 			/* continue later */
958 			return;
959 		}
960 		data->len_done += ret;
961 		data->len = (size_t)l;
962 		if(data->len_done < 4)
963 			return; /* continue later */
964 		data->len = (size_t)(ntohl(l));
965 		if(verbosity>=3) log_info("length is %d", (int)data->len);
966 		if(data->len == 0) {
967 			/* it is a control frame */
968 			data->control_frame = 1;
969 			/* read controlframelen */
970 			data->len_done = 0;
971 		} else {
972 			/* allocate frame size */
973 			data->frame = calloc(1, data->len);
974 			if(!data->frame) {
975 				log_err("out of memory");
976 				tap_data_free(data);
977 				return;
978 			}
979 		}
980 	}
981 
982 	/* we want to read the full length now */
983 	if(data->data_done < data->len) {
984 		ssize_t r = tap_receive(data, data->frame + data->data_done,
985 			data->len - data->data_done);
986 		if(verbosity>=4) log_info("f recv %d", (int)r);
987 		if(r == 0) {
988 			/* closed or error */
989 			tap_data_free(data);
990 			return;
991 		} else if(r == -1) {
992 			/* continue later */
993 			return;
994 		}
995 		data->data_done += r;
996 		if(data->data_done < data->len)
997 			return; /* continue later */
998 	}
999 
1000 	/* we are done with a frame */
1001 	if(verbosity>=3) log_info("received %sframe len %d",
1002 		(data->control_frame?"control ":""), (int)data->len);
1003 #ifdef USE_DNSTAP
1004 	if(data->control_frame)
1005 		log_control_frame(data->frame, data->len);
1006 	else	log_data_frame(data->frame, data->len);
1007 #endif
1008 
1009 	if(data->len >= 4 && sldns_read_uint32(data->frame) ==
1010 		FSTRM_CONTROL_FRAME_READY) {
1011 		data->is_bidirectional = 1;
1012 		if(verbosity) log_info("bidirectional stream");
1013 		if(!reply_with_accept(data)) {
1014 			tap_data_free(data);
1015 			return;
1016 		}
1017 	} else if(data->len >= 4 && sldns_read_uint32(data->frame) ==
1018 		FSTRM_CONTROL_FRAME_STOP && data->is_bidirectional) {
1019 		if(!reply_with_finish(fd)) {
1020 			tap_data_free(data);
1021 			return;
1022 		}
1023 	}
1024 
1025 	/* prepare for next frame */
1026 	free(data->frame);
1027 	data->frame = NULL;
1028 	data->control_frame = 0;
1029 	data->len = 0;
1030 	data->len_done = 0;
1031 	data->data_done = 0;
1032 
1033 }
1034 
1035 /** callback for main listening file descriptor */
1036 void dtio_mainfdcallback(int fd, short ATTR_UNUSED(bits), void* arg)
1037 {
1038 	struct tap_socket* tap_sock = (struct tap_socket*)arg;
1039 	struct main_tap_data* maindata = (struct main_tap_data*)
1040 		tap_sock->data;
1041 	struct tap_data* data;
1042 	char* id = NULL;
1043 	struct sockaddr_storage addr;
1044 	socklen_t addrlen = (socklen_t)sizeof(addr);
1045 	int s = accept(fd, (struct sockaddr*)&addr, &addrlen);
1046 	if(s == -1) {
1047 #ifndef USE_WINSOCK
1048 		/* EINTR is signal interrupt. others are closed connection. */
1049 		if(     errno == EINTR || errno == EAGAIN
1050 #ifdef EWOULDBLOCK
1051 			|| errno == EWOULDBLOCK
1052 #endif
1053 #ifdef ECONNABORTED
1054 			|| errno == ECONNABORTED
1055 #endif
1056 #ifdef EPROTO
1057 			|| errno == EPROTO
1058 #endif /* EPROTO */
1059 			)
1060 			return;
1061 #else /* USE_WINSOCK */
1062 		if(WSAGetLastError() == WSAEINPROGRESS ||
1063 			WSAGetLastError() == WSAECONNRESET)
1064 			return;
1065 		if(WSAGetLastError() == WSAEWOULDBLOCK) {
1066 			ub_winsock_tcp_wouldblock(maindata->ev, UB_EV_READ);
1067 			return;
1068 		}
1069 #endif
1070 		log_err_addr("accept failed", sock_strerror(errno), &addr,
1071 			addrlen);
1072 		return;
1073 	}
1074 	fd_set_nonblock(s);
1075 	if(verbosity) {
1076 		if(addr.ss_family == AF_LOCAL) {
1077 #ifdef HAVE_SYS_UN_H
1078 			struct sockaddr_un* usock = calloc(1, sizeof(struct sockaddr_un) + 1);
1079 			if(usock) {
1080 				socklen_t ulen = sizeof(struct sockaddr_un);
1081 				if(getsockname(fd, (struct sockaddr*)usock, &ulen) != -1) {
1082 					log_info("accepted new dnstap client from %s", usock->sun_path);
1083 					id = strdup(usock->sun_path);
1084 				} else {
1085 					log_info("accepted new dnstap client");
1086 				}
1087 				free(usock);
1088 			} else {
1089 				log_info("accepted new dnstap client");
1090 			}
1091 #endif /* HAVE_SYS_UN_H */
1092 		} else if(addr.ss_family == AF_INET ||
1093 			addr.ss_family == AF_INET6) {
1094 			char ip[256];
1095 			addr_to_str(&addr, addrlen, ip, sizeof(ip));
1096 			log_info("accepted new dnstap client from %s", ip);
1097 			id = strdup(ip);
1098 		} else {
1099 			log_info("accepted new dnstap client");
1100 		}
1101 	}
1102 
1103 	data = calloc(1, sizeof(*data));
1104 	if(!data) fatal_exit("out of memory");
1105 	data->fd = s;
1106 	data->id = id;
1107 	if(tap_sock->sslctx) {
1108 		data->ssl = incoming_ssl_fd(tap_sock->sslctx, data->fd);
1109 		if(!data->ssl) fatal_exit("could not SSL_new");
1110 	}
1111 	data->ev = ub_event_new(maindata->base, s, UB_EV_READ | UB_EV_PERSIST,
1112 		&dtio_tap_callback, data);
1113 	if(!data->ev) fatal_exit("could not ub_event_new");
1114 	if(ub_event_add(data->ev, NULL) != 0) fatal_exit("could not ub_event_add");
1115 }
1116 
1117 /** setup local accept sockets */
1118 static void setup_local_list(struct main_tap_data* maindata,
1119 	struct config_strlist_head* local_list)
1120 {
1121 	struct config_strlist* item;
1122 	for(item = local_list->first; item; item = item->next) {
1123 		struct tap_socket* s;
1124 		s = tap_socket_new_local(item->str, &dtio_mainfdcallback,
1125 			maindata);
1126 		if(!s) fatal_exit("out of memory");
1127 		if(!tap_socket_list_insert(&maindata->acceptlist, s))
1128 			fatal_exit("out of memory");
1129 	}
1130 }
1131 
1132 /** setup tcp accept sockets */
1133 static void setup_tcp_list(struct main_tap_data* maindata,
1134 	struct config_strlist_head* tcp_list)
1135 {
1136 	struct config_strlist* item;
1137 	for(item = tcp_list->first; item; item = item->next) {
1138 		struct tap_socket* s;
1139 		s = tap_socket_new_tcpaccept(item->str, &dtio_mainfdcallback,
1140 			maindata);
1141 		if(!s) fatal_exit("out of memory");
1142 		if(!tap_socket_list_insert(&maindata->acceptlist, s))
1143 			fatal_exit("out of memory");
1144 	}
1145 }
1146 
1147 /** setup tls accept sockets */
1148 static void setup_tls_list(struct main_tap_data* maindata,
1149 	struct config_strlist_head* tls_list, char* server_key,
1150 	char* server_cert, char* verifypem)
1151 {
1152 	struct config_strlist* item;
1153 	for(item = tls_list->first; item; item = item->next) {
1154 		struct tap_socket* s;
1155 		s = tap_socket_new_tlsaccept(item->str, &dtio_mainfdcallback,
1156 			maindata, server_key, server_cert, verifypem);
1157 		if(!s) fatal_exit("out of memory");
1158 		if(!tap_socket_list_insert(&maindata->acceptlist, s))
1159 			fatal_exit("out of memory");
1160 	}
1161 }
1162 
1163 /** signal variable */
1164 static struct ub_event_base* sig_base = NULL;
1165 /** do we have to quit */
1166 int sig_quit = 0;
1167 /** signal handler for user quit */
1168 static RETSIGTYPE main_sigh(int sig)
1169 {
1170 	if(!sig_quit) {
1171 		char str[] = "exit on signal   \n";
1172 		str[15] = '0' + (sig/10)%10;
1173 		str[16] = '0' + sig%10;
1174 		/* simple cast to void will not silence Wunused-result */
1175 		(void)!write(STDERR_FILENO, str, strlen(str));
1176 	}
1177 	if(sig_base) {
1178 		ub_event_base_loopexit(sig_base);
1179 		sig_base = NULL;
1180 	}
1181 	sig_quit = 1;
1182 }
1183 
1184 /** setup and run the server to listen to DNSTAP messages */
1185 static void
1186 setup_and_run(struct config_strlist_head* local_list,
1187 	struct config_strlist_head* tcp_list,
1188 	struct config_strlist_head* tls_list, char* server_key,
1189 	char* server_cert, char* verifypem)
1190 {
1191 	time_t secs = 0;
1192 	struct timeval now;
1193 	struct main_tap_data* maindata;
1194 	struct ub_event_base* base;
1195 	const char *evnm="event", *evsys="", *evmethod="";
1196 
1197 	maindata = calloc(1, sizeof(*maindata));
1198 	if(!maindata) fatal_exit("out of memory");
1199 	memset(&now, 0, sizeof(now));
1200 	base = ub_default_event_base(1, &secs, &now);
1201 	if(!base) fatal_exit("could not create ub_event base");
1202 	maindata->base = base;
1203 	sig_base = base;
1204 	if(sig_quit) {
1205 		ub_event_base_free(base);
1206 		free(maindata);
1207 		return;
1208 	}
1209 	ub_get_event_sys(base, &evnm, &evsys, &evmethod);
1210 	if(verbosity) log_info("%s %s uses %s method", evnm, evsys, evmethod);
1211 
1212 	setup_local_list(maindata, local_list);
1213 	setup_tcp_list(maindata, tcp_list);
1214 	setup_tls_list(maindata, tls_list, server_key, server_cert,
1215 		verifypem);
1216 	if(!tap_socket_list_addevs(maindata->acceptlist, base))
1217 		fatal_exit("could not setup accept events");
1218 	if(verbosity) log_info("start of service");
1219 
1220 	ub_event_base_dispatch(base);
1221 	sig_base = NULL;
1222 
1223 	if(verbosity) log_info("end of service");
1224 	tap_socket_list_delete(maindata->acceptlist);
1225 	ub_event_base_free(base);
1226 	free(maindata);
1227 }
1228 
1229 /** getopt global, in case header files fail to declare it. */
1230 extern int optind;
1231 /** getopt global, in case header files fail to declare it. */
1232 extern char* optarg;
1233 
1234 /** main program for streamtcp */
1235 int main(int argc, char** argv)
1236 {
1237 	int c;
1238 	int usessl = 0;
1239 	struct config_strlist_head local_list;
1240 	struct config_strlist_head tcp_list;
1241 	struct config_strlist_head tls_list;
1242 	char* server_key = NULL, *server_cert = NULL, *verifypem = NULL;
1243 #ifdef USE_WINSOCK
1244 	WSADATA wsa_data;
1245 	if(WSAStartup(MAKEWORD(2,2), &wsa_data) != 0) {
1246 		printf("WSAStartup failed\n");
1247 		return 1;
1248 	}
1249 #endif
1250 	if(signal(SIGINT, main_sigh) == SIG_ERR ||
1251 #ifdef SIGQUIT
1252 		signal(SIGQUIT, main_sigh) == SIG_ERR ||
1253 #endif
1254 #ifdef SIGHUP
1255 		signal(SIGHUP, main_sigh) == SIG_ERR ||
1256 #endif
1257 #ifdef SIGBREAK
1258 		signal(SIGBREAK, main_sigh) == SIG_ERR ||
1259 #endif
1260 		signal(SIGTERM, main_sigh) == SIG_ERR)
1261 		fatal_exit("could not bind to signal");
1262 	memset(&local_list, 0, sizeof(local_list));
1263 	memset(&tcp_list, 0, sizeof(tcp_list));
1264 	memset(&tls_list, 0, sizeof(tls_list));
1265 
1266 	/* lock debug start (if any) */
1267 	log_ident_set("unbound-dnstap-socket");
1268 	log_init(0, 0, 0);
1269 	checklock_start();
1270 
1271 #ifdef SIGPIPE
1272 	if(signal(SIGPIPE, SIG_IGN) == SIG_ERR) {
1273 		perror("could not install signal handler for SIGPIPE");
1274 		return 1;
1275 	}
1276 #endif
1277 
1278 	/* command line options */
1279 	while( (c=getopt(argc, argv, "hls:t:u:vx:y:z:")) != -1) {
1280 		switch(c) {
1281 			case 'u':
1282 				if(!cfg_strlist_append(&local_list,
1283 					strdup(optarg)))
1284 					fatal_exit("out of memory");
1285 				break;
1286 			case 's':
1287 				if(!cfg_strlist_append(&tcp_list,
1288 					strdup(optarg)))
1289 					fatal_exit("out of memory");
1290 				break;
1291 			case 't':
1292 				if(!cfg_strlist_append(&tls_list,
1293 					strdup(optarg)))
1294 					fatal_exit("out of memory");
1295 				usessl = 1;
1296 				break;
1297 			case 'x':
1298 				server_key = optarg;
1299 				usessl = 1;
1300 				break;
1301 			case 'y':
1302 				server_cert = optarg;
1303 				usessl = 1;
1304 				break;
1305 			case 'z':
1306 				verifypem = optarg;
1307 				usessl = 1;
1308 				break;
1309 			case 'l':
1310 				longformat = 1;
1311 				break;
1312 			case 'v':
1313 				verbosity++;
1314 				break;
1315 			case 'h':
1316 			case '?':
1317 			default:
1318 				usage(argv);
1319 		}
1320 	}
1321 	argc -= optind;
1322 	argv += optind;
1323 
1324 	if(usessl) {
1325 #ifdef HAVE_SSL
1326 #if OPENSSL_VERSION_NUMBER < 0x10100000 || !defined(HAVE_OPENSSL_INIT_SSL)
1327 		ERR_load_SSL_strings();
1328 #endif
1329 #if OPENSSL_VERSION_NUMBER < 0x10100000 || !defined(HAVE_OPENSSL_INIT_CRYPTO)
1330 #  ifndef S_SPLINT_S
1331 		OpenSSL_add_all_algorithms();
1332 #  endif
1333 #else
1334 		OPENSSL_init_crypto(OPENSSL_INIT_ADD_ALL_CIPHERS
1335 			| OPENSSL_INIT_ADD_ALL_DIGESTS
1336 			| OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL);
1337 #endif
1338 #if OPENSSL_VERSION_NUMBER < 0x10100000 || !defined(HAVE_OPENSSL_INIT_SSL)
1339 		(void)SSL_library_init();
1340 #else
1341 		(void)OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS, NULL);
1342 #endif
1343 #endif /* HAVE_SSL */
1344 	}
1345 	setup_and_run(&local_list, &tcp_list, &tls_list, server_key,
1346 		server_cert, verifypem);
1347 	config_delstrlist(local_list.first);
1348 	config_delstrlist(tcp_list.first);
1349 	config_delstrlist(tls_list.first);
1350 
1351 	checklock_stop();
1352 #ifdef USE_WINSOCK
1353 	WSACleanup();
1354 #endif
1355 	return 0;
1356 }
1357 
1358 /***--- definitions to make fptr_wlist work. ---***/
1359 /* These are callbacks, similar to smallapp callbacks, except the debug
1360  * tool callbacks are not in it */
1361 struct tube;
1362 struct query_info;
1363 #include "util/data/packed_rrset.h"
1364 #include "daemon/worker.h"
1365 #include "daemon/remote.h"
1366 #include "util/fptr_wlist.h"
1367 #include "libunbound/context.h"
1368 
1369 void worker_handle_control_cmd(struct tube* ATTR_UNUSED(tube),
1370 	uint8_t* ATTR_UNUSED(buffer), size_t ATTR_UNUSED(len),
1371 	int ATTR_UNUSED(error), void* ATTR_UNUSED(arg))
1372 {
1373 	log_assert(0);
1374 }
1375 
1376 int worker_handle_request(struct comm_point* ATTR_UNUSED(c),
1377 	void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
1378         struct comm_reply* ATTR_UNUSED(repinfo))
1379 {
1380 	log_assert(0);
1381 	return 0;
1382 }
1383 
1384 int worker_handle_service_reply(struct comm_point* ATTR_UNUSED(c),
1385 	void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
1386         struct comm_reply* ATTR_UNUSED(reply_info))
1387 {
1388 	log_assert(0);
1389 	return 0;
1390 }
1391 
1392 int remote_accept_callback(struct comm_point* ATTR_UNUSED(c),
1393 	void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
1394         struct comm_reply* ATTR_UNUSED(repinfo))
1395 {
1396 	log_assert(0);
1397 	return 0;
1398 }
1399 
1400 int remote_control_callback(struct comm_point* ATTR_UNUSED(c),
1401 	void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
1402         struct comm_reply* ATTR_UNUSED(repinfo))
1403 {
1404 	log_assert(0);
1405 	return 0;
1406 }
1407 
1408 void worker_sighandler(int ATTR_UNUSED(sig), void* ATTR_UNUSED(arg))
1409 {
1410 	log_assert(0);
1411 }
1412 
1413 struct outbound_entry* worker_send_query(
1414 	struct query_info* ATTR_UNUSED(qinfo), uint16_t ATTR_UNUSED(flags),
1415 	int ATTR_UNUSED(dnssec), int ATTR_UNUSED(want_dnssec),
1416 	int ATTR_UNUSED(nocaps), struct sockaddr_storage* ATTR_UNUSED(addr),
1417 	socklen_t ATTR_UNUSED(addrlen), uint8_t* ATTR_UNUSED(zone),
1418 	size_t ATTR_UNUSED(zonelen), int ATTR_UNUSED(ssl_upstream),
1419 	char* ATTR_UNUSED(tls_auth_name), struct module_qstate* ATTR_UNUSED(q))
1420 {
1421 	log_assert(0);
1422 	return 0;
1423 }
1424 
1425 #ifdef UB_ON_WINDOWS
1426 void
1427 worker_win_stop_cb(int ATTR_UNUSED(fd), short ATTR_UNUSED(ev), void*
1428 	ATTR_UNUSED(arg)) {
1429 	log_assert(0);
1430 }
1431 
1432 void
1433 wsvc_cron_cb(void* ATTR_UNUSED(arg))
1434 {
1435 	log_assert(0);
1436 }
1437 #endif /* UB_ON_WINDOWS */
1438 
1439 void
1440 worker_alloc_cleanup(void* ATTR_UNUSED(arg))
1441 {
1442 	log_assert(0);
1443 }
1444 
1445 struct outbound_entry* libworker_send_query(
1446 	struct query_info* ATTR_UNUSED(qinfo), uint16_t ATTR_UNUSED(flags),
1447 	int ATTR_UNUSED(dnssec), int ATTR_UNUSED(want_dnssec),
1448 	int ATTR_UNUSED(nocaps), struct sockaddr_storage* ATTR_UNUSED(addr),
1449 	socklen_t ATTR_UNUSED(addrlen), uint8_t* ATTR_UNUSED(zone),
1450 	size_t ATTR_UNUSED(zonelen), int ATTR_UNUSED(ssl_upstream),
1451 	char* ATTR_UNUSED(tls_auth_name), struct module_qstate* ATTR_UNUSED(q))
1452 {
1453 	log_assert(0);
1454 	return 0;
1455 }
1456 
1457 int libworker_handle_service_reply(struct comm_point* ATTR_UNUSED(c),
1458 	void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
1459         struct comm_reply* ATTR_UNUSED(reply_info))
1460 {
1461 	log_assert(0);
1462 	return 0;
1463 }
1464 
1465 void libworker_handle_control_cmd(struct tube* ATTR_UNUSED(tube),
1466         uint8_t* ATTR_UNUSED(buffer), size_t ATTR_UNUSED(len),
1467         int ATTR_UNUSED(error), void* ATTR_UNUSED(arg))
1468 {
1469         log_assert(0);
1470 }
1471 
1472 void libworker_fg_done_cb(void* ATTR_UNUSED(arg), int ATTR_UNUSED(rcode),
1473 	struct sldns_buffer* ATTR_UNUSED(buf), enum sec_status ATTR_UNUSED(s),
1474 	char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited))
1475 {
1476 	log_assert(0);
1477 }
1478 
1479 void libworker_bg_done_cb(void* ATTR_UNUSED(arg), int ATTR_UNUSED(rcode),
1480 	struct sldns_buffer* ATTR_UNUSED(buf), enum sec_status ATTR_UNUSED(s),
1481 	char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited))
1482 {
1483 	log_assert(0);
1484 }
1485 
1486 void libworker_event_done_cb(void* ATTR_UNUSED(arg), int ATTR_UNUSED(rcode),
1487 	struct sldns_buffer* ATTR_UNUSED(buf), enum sec_status ATTR_UNUSED(s),
1488 	char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited))
1489 {
1490 	log_assert(0);
1491 }
1492 
1493 int context_query_cmp(const void* ATTR_UNUSED(a), const void* ATTR_UNUSED(b))
1494 {
1495 	log_assert(0);
1496 	return 0;
1497 }
1498 
1499 void worker_stat_timer_cb(void* ATTR_UNUSED(arg))
1500 {
1501 	log_assert(0);
1502 }
1503 
1504 void worker_probe_timer_cb(void* ATTR_UNUSED(arg))
1505 {
1506 	log_assert(0);
1507 }
1508 
1509 void worker_start_accept(void* ATTR_UNUSED(arg))
1510 {
1511 	log_assert(0);
1512 }
1513 
1514 void worker_stop_accept(void* ATTR_UNUSED(arg))
1515 {
1516 	log_assert(0);
1517 }
1518 
1519 /** keep track of lock id in lock-verify application */
1520 struct order_id {
1521         /** the thread id that created it */
1522         int thr;
1523         /** the instance number of creation */
1524         int instance;
1525 };
1526 
1527 int order_lock_cmp(const void* e1, const void* e2)
1528 {
1529         const struct order_id* o1 = e1;
1530         const struct order_id* o2 = e2;
1531         if(o1->thr < o2->thr) return -1;
1532         if(o1->thr > o2->thr) return 1;
1533         if(o1->instance < o2->instance) return -1;
1534         if(o1->instance > o2->instance) return 1;
1535         return 0;
1536 }
1537 
1538 int
1539 codeline_cmp(const void* a, const void* b)
1540 {
1541         return strcmp(a, b);
1542 }
1543 
1544 int replay_var_compare(const void* ATTR_UNUSED(a), const void* ATTR_UNUSED(b))
1545 {
1546         log_assert(0);
1547         return 0;
1548 }
1549 
1550 void remote_get_opt_ssl(char* ATTR_UNUSED(str), void* ATTR_UNUSED(arg))
1551 {
1552         log_assert(0);
1553 }
1554