Skip to content
Snippets Groups Projects
gtls.c 14 KiB
Newer Older
  • Learn to ignore specific revisions
  • 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464
    /***************************************************************************
     *                                  _   _ ____  _
     *  Project                     ___| | | |  _ \| |
     *                             / __| | | | |_) | |
     *                            | (__| |_| |  _ <| |___
     *                             \___|\___/|_| \_\_____|
     *
     * Copyright (C) 1998 - 2005, Daniel Stenberg, <daniel@haxx.se>, et al.
     *
     * This software is licensed as described in the file COPYING, which
     * you should have received as part of this distribution. The terms
     * are also available at http://curl.haxx.se/docs/copyright.html.
     *
     * You may opt to use, copy, modify, merge, publish, distribute and/or sell
     * copies of the Software, and permit persons to whom the Software is
     * furnished to do so, under the terms of the COPYING file.
     *
     * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
     * KIND, either express or implied.
     *
     * $Id$
     ***************************************************************************/
    
    /*
     * Source file for all GnuTLS-specific code for the TLS/SSL layer. No code
     * but sslgen.c should ever call or use these functions.
     *
     * Note: don't use the GnuTLS' *_t variable type names in this source code,
     * since they were not present in 1.0.X.
     */
    
    #include "setup.h"
    #ifdef USE_GNUTLS
    #include <gnutls/gnutls.h>
    #include <gnutls/x509.h>
    
    #include <string.h>
    #include <stdlib.h>
    #include <ctype.h>
    #ifdef HAVE_SYS_TYPES_H
    #include <sys/types.h>
    #endif
    #ifdef HAVE_SYS_SOCKET_H
    #include <sys/socket.h>
    #endif
    
    #include "urldata.h"
    #include "sendf.h"
    #include "gtls.h"
    #include "sslgen.h"
    #include "parsedate.h"
    #include "connect.h" /* for the connect timeout */
    #include "select.h"
    #define _MPRINTF_REPLACE /* use our functions only */
    #include <curl/mprintf.h>
    #include "memory.h"
    /* The last #include file should be: */
    #include "memdebug.h"
    
    /* Global GnuTLS init, called from Curl_ssl_init() */
    int Curl_gtls_init(void)
    {
      gnutls_global_init();
      return 1;
    }
    
    int Curl_gtls_cleanup(void)
    {
      gnutls_global_deinit();
      return 1;
    }
    
    static void showtime(struct SessionHandle *data,
                         const char *text,
                         time_t stamp)
    {
      struct tm *tm;
    #ifdef HAVE_GMTIME_R
      struct tm buffer;
      tm = (struct tm *)gmtime_r(&stamp, &buffer);
    #else
      tm = gmtime(&stamp);
    #endif
      snprintf(data->state.buffer,
               BUFSIZE,
               "\t %s: %s, %02d %s %4d %02d:%02d:%02d GMT\n",
               text,
               Curl_wkday[tm->tm_wday?tm->tm_wday-1:6],
               tm->tm_mday,
               Curl_month[tm->tm_mon],
               tm->tm_year + 1900,
               tm->tm_hour,
               tm->tm_min,
               tm->tm_sec);
      infof(data, "%s", data->state.buffer);
    }
    
    
    /*
     * This function is called after the TCP connect has completed. Setup the TLS
     * layer and do all necessary magic.
     */
    CURLcode
    Curl_gtls_connect(struct connectdata *conn,
                      int sockindex)
    
    {
      const int cert_type_priority[3] = { GNUTLS_CRT_X509, 0 };
      struct SessionHandle *data = conn->data;
      gnutls_session session;
      int rc;
      unsigned int cert_list_size;
      const gnutls_datum *chainp;
      unsigned int verify_status;
      gnutls_x509_crt x509_cert;
      char certbuf[256]; /* big enough? */
      size_t size;
      unsigned int algo;
      unsigned int bits;
      time_t clock;
      const char *ptr;
      void *ssl_sessionid;
      size_t ssl_idsize;
    
      /* GnuTLS only supports TLSv1 (and SSLv3?) */
      if(data->set.ssl.version == CURL_SSLVERSION_SSLv2) {
        failf(data, "GnuTLS does not support SSLv2");
        return CURLE_SSL_CONNECT_ERROR;
      }
    
      /* allocate a cred struct */
      rc = gnutls_certificate_allocate_credentials(&conn->ssl[sockindex].cred);
      if(rc < 0) {
        failf(data, "gnutls_cert_all_cred() failed: %d", rc);
        return CURLE_SSL_CONNECT_ERROR;
      }
    
      /* set the trusted CA cert bundle file */
      rc = gnutls_certificate_set_x509_trust_file(conn->ssl[sockindex].cred,
                                                  data->set.ssl.CAfile,
                                                  GNUTLS_X509_FMT_PEM);
    
      /* Initialize TLS session as a client */
      rc = gnutls_init(&conn->ssl[sockindex].session, GNUTLS_CLIENT);
      if(rc) {
        failf(data, "gnutls_init() failed: %d", rc);
        return CURLE_SSL_CONNECT_ERROR;
      }
    
      /* convenient assign */
      session = conn->ssl[sockindex].session;
    
      /* Use default priorities */
      rc = gnutls_set_default_priority(session);
      if(rc < 0)
        return CURLE_SSL_CONNECT_ERROR;
    
      /* Sets the priority on the certificate types supported by gnutls. Priority
         is higher for types specified before others. After specifying the types
         you want, you must append a 0. */
      rc = gnutls_certificate_type_set_priority(session, cert_type_priority);
      if(rc < 0)
        return CURLE_SSL_CONNECT_ERROR;
    
      /* put the anonymous credentials to the current session */
      rc = gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE,
                                  conn->ssl[sockindex].cred);
    
      /* set the connection handle (file descriptor for the socket) */
      gnutls_transport_set_ptr(session,
                               (gnutls_transport_ptr)conn->sock[sockindex]);
    
      /* This might be a reconnect, so we check for a session ID in the cache
         to speed up things */
    
      if(!Curl_ssl_getsessionid(conn, &ssl_sessionid, &ssl_idsize)) {
        /* we got a session id, use it! */
        gnutls_session_set_data(session, ssl_sessionid, ssl_idsize);
    
        /* Informational message */
        infof (data, "SSL re-using session ID\n");
      }
    
      do {
        rc = gnutls_handshake(session);
    
        if((rc == GNUTLS_E_AGAIN) || (rc == GNUTLS_E_INTERRUPTED)) {
          long timeout_ms;
          long has_passed;
    
          if(data->set.timeout || data->set.connecttimeout) {
            /* get the most strict timeout of the ones converted to milliseconds */
            if(data->set.timeout &&
               (data->set.timeout>data->set.connecttimeout))
              timeout_ms = data->set.timeout*1000;
            else
              timeout_ms = data->set.connecttimeout*1000;
          }
          else
            timeout_ms = DEFAULT_CONNECT_TIMEOUT;
    
          /* Evaluate in milliseconds how much time that has passed */
          has_passed = Curl_tvdiff(Curl_tvnow(), data->progress.t_startsingle);
    
          /* subtract the passed time */
          timeout_ms -= has_passed;
    
          if(timeout_ms < 0) {
            /* a precaution, no need to continue if time already is up */
            failf(data, "SSL connection timeout");
            return CURLE_OPERATION_TIMEOUTED;
          }
    
          rc = Curl_select(conn->sock[sockindex],
                             conn->sock[sockindex], (int)timeout_ms);
          if(rc > 0)
            /* reabable or writable, go loop*/
            continue;
          else if(0 == rc) {
            /* timeout */
            failf(data, "SSL connection timeout");
            return CURLE_OPERATION_TIMEDOUT;
          }
          else {
            /* anything that gets here is fatally bad */
            failf(data, "select on SSL socket, errno: %d", Curl_ourerrno());
            return CURLE_SSL_CONNECT_ERROR;
          }
        }
        else
          break;
      } while(1);
    
      if (rc < 0) {
        failf(data, "gnutls_handshake() failed: %d", rc);
        /* gnutls_perror(ret); */
        return CURLE_SSL_CONNECT_ERROR;
      }
    
      /* This function will return the peer's raw certificate (chain) as sent by
         the peer. These certificates are in raw format (DER encoded for
         X.509). In case of a X.509 then a certificate list may be present. The
         first certificate in the list is the peer's certificate, following the
         issuer's certificate, then the issuer's issuer etc. */
    
      chainp = gnutls_certificate_get_peers(session, &cert_list_size);
      if(!chainp) {
        if(data->set.ssl.verifyhost) {
          failf(data, "failed to get server cert");
          return CURLE_SSL_PEER_CERTIFICATE;
        }
        infof(data, "\t common name: WARNING couldn't obtain\n");
      }
    
      /* This function will try to verify the peer's certificate and return its
         status (trusted, invalid etc.). The value of status should be one or more
         of the gnutls_certificate_status_t enumerated elements bitwise or'd. To
         avoid denial of service attacks some default upper limits regarding the
         certificate key size and chain size are set. To override them use
         gnutls_certificate_set_verify_limits(). */
    
      rc = gnutls_certificate_verify_peers2(session, &verify_status);
      if (rc < 0) {
        failf(data, "server cert verify failed: %d", rc);
        return CURLE_SSL_CONNECT_ERROR;
      }
    
      /* verify_status is a bitmask of gnutls_certificate_status bits */
      if(verify_status & GNUTLS_CERT_INVALID) {
        if (data->set.ssl.verifypeer) {
          failf(data, "server certificate verification failed. CAfile: %s",
                data->set.ssl.CAfile?data->set.ssl.CAfile:"none");
          return CURLE_SSL_CACERT;
        }
        else
          infof(data, "\t server certificate verification FAILED\n");
      }
      else
          infof(data, "\t server certificate verification OK\n");
    
      /* initialize an X.509 certificate structure. */
      gnutls_x509_crt_init(&x509_cert);
    
      /* convert the given DER or PEM encoded Certificate to the native
         gnutls_x509_crt_t format */
      gnutls_x509_crt_import(x509_cert, chainp, GNUTLS_X509_FMT_DER);
    
      size=sizeof(certbuf);
      rc = gnutls_x509_crt_get_dn_by_oid(x509_cert, GNUTLS_OID_X520_COMMON_NAME,
                                         0, /* the first and only one */
                                         TRUE, /* give to me raw please */
                                         certbuf,
                                         &size);
    
      /* This function will check if the given certificate's subject matches the
         given hostname. This is a basic implementation of the matching described
         in RFC2818 (HTTPS), which takes into account wildcards, and the subject
         alternative name PKIX extension. Returns non zero on success, and zero on
         failure. */
      rc = gnutls_x509_crt_check_hostname(x509_cert, conn->host.name);
    
      if(!rc) {
        if (data->set.ssl.verifyhost > 1) {
          failf(data, "SSL: certificate subject name (%s) does not match "
                "target host name '%s'", certbuf, conn->host.dispname);
          gnutls_x509_crt_deinit(x509_cert);
          return CURLE_SSL_PEER_CERTIFICATE;
        }
        else
          infof(data, "\t common name: %s (does not match '%s')\n",
                certbuf, conn->host.dispname);
      }
      else
        infof(data, "\t common name: %s (matched)\n", certbuf);
    
      /* Show:
    
      - ciphers used
      - subject
      - start date
      - expire date
      - common name
      - issuer
    
      */
    
      /* public key algorithm's parameters */
      algo = gnutls_x509_crt_get_pk_algorithm(x509_cert, &bits);
      infof(data, "\t certificate public key: %s\n",
            gnutls_pk_algorithm_get_name(algo));
    
      /* version of the X.509 certificate. */
      infof(data, "\t certificate version: #%d\n",
            gnutls_x509_crt_get_version(x509_cert));
    
    
      size = sizeof(certbuf);
      gnutls_x509_crt_get_dn(x509_cert, certbuf, &size);
      infof(data, "\t subject: %s\n", certbuf);
    
      clock = gnutls_x509_crt_get_activation_time(x509_cert);
      showtime(data, "start date", clock);
    
      clock = gnutls_x509_crt_get_expiration_time(x509_cert);
      showtime(data, "expire date", clock);
    
      size = sizeof(certbuf);
      gnutls_x509_crt_get_issuer_dn(x509_cert, certbuf, &size);
      infof(data, "\t issuer: %s\n", certbuf);
    
      gnutls_x509_crt_deinit(x509_cert);
    
      /* compression algorithm (if any) */
      ptr = gnutls_compression_get_name(gnutls_compression_get(session));
      /* the *_get_name() says "NULL" if GNUTLS_COMP_NULL is returned */
      infof(data, "\t compression: %s\n", ptr);
    
      /* the name of the cipher used. ie 3DES. */
      ptr = gnutls_cipher_get_name(gnutls_cipher_get(session));
      infof(data, "\t cipher: %s\n", ptr);
    
      /* the MAC algorithms name. ie SHA1 */
      ptr = gnutls_mac_get_name(gnutls_mac_get(session));
      infof(data, "\t MAC: %s\n", ptr);
    
      if(!ssl_sessionid) {
        /* this session was not previously in the cache, add it now */
    
        /* get the session ID data size */
        gnutls_session_get_data(session, NULL, &ssl_idsize);
        ssl_sessionid = malloc(ssl_idsize); /* get a buffer for it */
    
        if(ssl_sessionid) {
          /* extract session ID to the allocated buffer */
          gnutls_session_get_data(session, ssl_sessionid, &ssl_idsize);
    
          /* store this session id */
          return Curl_ssl_addsessionid(conn, ssl_sessionid, ssl_idsize);
        }
      }
    
      return CURLE_OK;
    }
    
    
    /* return number of sent (non-SSL) bytes */
    int Curl_gtls_send(struct connectdata *conn,
                       int sockindex,
                       void *mem,
                       size_t len)
    {
      int rc;
      rc = gnutls_record_send(conn->ssl[sockindex].session, mem, len);
    
      return rc;
    }
    
    void Curl_gtls_close_all(struct SessionHandle *data)
    {
      /* FIX: make the OpenSSL code more generic and use parts of it here */
      (void)data;
    }
    
    static void close_one(struct connectdata *conn,
                          int index)
    {
      gnutls_bye(conn->ssl[index].session, GNUTLS_SHUT_RDWR);
      gnutls_deinit(conn->ssl[index].session);
      gnutls_certificate_free_credentials(conn->ssl[index].cred);
    }
    
    void Curl_gtls_close(struct connectdata *conn)
    {
      if(conn->ssl[0].use)
        close_one(conn, 0);
      if(conn->ssl[1].use)
        close_one(conn, 1);
    }
    
    /*
     * If the read would block we return -1 and set 'wouldblock' to TRUE.
     * Otherwise we return the amount of data read. Other errors should return -1
     * and set 'wouldblock' to FALSE.
     */
    ssize_t Curl_gtls_recv(struct connectdata *conn, /* connection data */
                           int num,                  /* socketindex */
                           char *buf,                /* store read data here */
                           size_t buffersize,        /* max amount to read */
                           bool *wouldblock)
    {
      ssize_t ret;
    
      ret = gnutls_record_recv(conn->ssl[num].session, buf, buffersize);
      if((ret == GNUTLS_E_AGAIN) || (ret == GNUTLS_E_INTERRUPTED)) {
        *wouldblock = TRUE;
        return -1;
      }
    
      *wouldblock = FALSE;
      if (!ret) {
        failf(conn->data, "Peer closed the TLS connection");
        return -1;
      }
    
      if (ret < 0) {
        failf(conn->data, "GnuTLS recv error (%d): %s",
              (int)ret, gnutls_strerror(ret));
        return -1;
      }
    
      return ret;
    }
    
    void Curl_gtls_session_free(void *ptr)
    {
      free(ptr);
    }
    
    size_t Curl_gtls_version(char *buffer, size_t size)
    {
      return snprintf(buffer, size, " GnuTLS/%s", gnutls_check_version(NULL));
    }
    
    #endif /* USE_GNUTLS */